For educational purposes only, exhaustive samples of 500+ classic/modern trojan builders including screenshots.
☆3,824Apr 20, 2026Updated last week
Alternatives and similar repositories for Ultimate-RAT-Collection
Users that are interested in Ultimate-RAT-Collection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆467Mar 21, 2026Updated last month
- Xeno-RAT is an open-source remote access tool (RAT) developed in C#, providing a comprehensive set of features for remote system manageme…☆1,517Mar 5, 2024Updated 2 years ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,355Nov 12, 2025Updated 5 months ago
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,412Apr 13, 2026Updated 2 weeks ago
- AdaptixC2 is a highly modular advanced redteam toolkit☆3,033Mar 22, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆513Mar 7, 2026Updated last month
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,316Mar 27, 2026Updated last month
- EDR Lab for Experimentation Purposes☆1,428Mar 1, 2026Updated last month
- The Havoc Framework☆8,311Dec 18, 2025Updated 4 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,859Nov 3, 2024Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆517Aug 14, 2025Updated 8 months ago
- A modern 32/64-bit position independent implant template☆1,319Mar 21, 2025Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆3,236Mar 28, 2025Updated last year
- The Network Execution Tool☆5,469Updated this week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Real fucking shellcode encryptor & obfuscator tool☆1,022Jan 7, 2026Updated 3 months ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,074Mar 10, 2026Updated last month
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,997Sep 10, 2025Updated 7 months ago
- Open-Source Remote Administration Tool For Windows C# (RAT)☆2,899Oct 16, 2023Updated 2 years ago
- The recursive internet scanner for hackers. 🧡☆9,633Updated this week
- Centralized resource for listing and organizing known injection techniques and POCs☆696Feb 1, 2026Updated 2 months ago
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆285Apr 6, 2025Updated last year
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,810Updated this week
- Adversary Emulation Framework☆11,081Apr 22, 2026Updated last week
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Windows Kernel Rootkit in Rust☆689Oct 10, 2025Updated 6 months ago
- Collection of various malicious functionality to aid in malware development☆1,877Feb 28, 2024Updated 2 years ago
- Windows rootkit for Intel x64 with 25+ features, demonstrating rootkit techniques compatible with all Windows 10 and Windows 11 versions.☆2,317Feb 15, 2026Updated 2 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆817Mar 28, 2025Updated last year
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆594Jun 12, 2024Updated last year
- Remote Access Trojan collection.(260+ RAT-Builders!)☆308Feb 26, 2022Updated 4 years ago
- Simulate the behavior of AV/EDR for malware development training.☆567Feb 15, 2024Updated 2 years ago
- Now You See Me, Now You Don't☆1,043Jan 23, 2026Updated 3 months ago
- Collect Windows telemetry for Maldev☆471Updated this week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust☆1,866Dec 29, 2025Updated 3 months ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,521Jan 26, 2026Updated 3 months ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,437Apr 9, 2026Updated 2 weeks ago
- Inject DLLs into the explorer process using icons☆407May 18, 2025Updated 11 months ago
- Tools and Techniques for Red Team / Penetration Testing☆8,682Apr 18, 2026Updated last week
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- A resource containing all the tools each ransomware gangs uses☆1,355Apr 1, 2026Updated 3 weeks ago