Understand the nature of malicious software with practical examples in Python.
☆2,228Dec 19, 2023Updated 2 years ago
Alternatives and similar repositories for malware_showcase
Users that are interested in malware_showcase are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malware programs written in python, reference from PatrikH0lop/malware_showcase☆54May 17, 2022Updated 3 years ago
- One of a few malware collections on the GitHub.☆2,778Aug 1, 2025Updated 8 months ago
- Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles☆626Mar 5, 2025Updated last year
- Rootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Keylogger | Botnets | Worms | Other Network Tools☆190Jan 27, 2021Updated 5 years ago
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,953Sep 10, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,854Apr 8, 2026Updated last week
- Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com☆1,163Apr 14, 2025Updated last year
- A collection of malware samples caught by several honeypots i manage☆1,804Sep 15, 2021Updated 4 years ago
- ☆2,000Jun 25, 2023Updated 2 years ago
- A repository full of malware samples.☆1,588Dec 24, 2023Updated 2 years ago
- 🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware thre…☆1,156Jan 12, 2024Updated 2 years ago
- Codebase to generate an msdt-follina payload☆1,632Jun 8, 2022Updated 3 years ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,944Oct 7, 2023Updated 2 years ago
- Organized list of my malware development resources☆1,711Apr 1, 2026Updated 2 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- virus collection source code☆507Feb 8, 2023Updated 3 years ago
- Defund the Police.☆13,608Jun 7, 2024Updated last year
- An open-source post-exploitation framework for students, researchers and developers.☆9,456Apr 2, 2026Updated 2 weeks ago
- ☆2,177Oct 22, 2024Updated last year
- The Official USB Rubber Ducky Payload Repository☆5,653Apr 10, 2026Updated last week
- A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and…☆1,568Updated this week
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆12,927Apr 1, 2026Updated 2 weeks ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,199Updated this week
- ALL IN ONE Hacking Tool For Hackers☆58,026Mar 15, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickn…☆12,607Aug 25, 2025Updated 7 months ago
- Malware samples, analysis exercises and other interesting resources.☆1,625Jan 13, 2024Updated 2 years ago
- A workshop about Malware Development☆1,774Jun 2, 2023Updated 2 years ago
- A Linux Ransomware☆772Jan 24, 2025Updated last year
- Course materials for Malware Analysis by RPISEC☆4,010Aug 26, 2022Updated 3 years ago
- Hunt down social media accounts by username across social networks☆80,840Updated this week
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,649Apr 9, 2026Updated last week
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,133Mar 17, 2024Updated 2 years ago
- Python network worm that spreads on the local network and gives the attacker control of these machines.☆531Oct 5, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A POC Windows crypto-ransomware (Academic). Now Ransom:Win32/MauriCrypt.MK!MTB☆960Nov 17, 2018Updated 7 years ago
- Python based c2 server with a basic beacon server to route the traffic from dummy server to prevent attacker's ip from getting exposed☆25Jul 23, 2019Updated 6 years ago
- Python Remote Administration Tool (RAT)☆3,580Jan 4, 2024Updated 2 years ago
- Create a USB Rubber Ducky like device using a Raspberry PI Pico☆3,180Mar 18, 2026Updated 3 weeks ago
- ☆126Mar 20, 2024Updated 2 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆25Dec 14, 2021Updated 4 years ago
- Information gathering framework for phone numbers☆16,203Jan 6, 2026Updated 3 months ago