Understand the nature of malicious software with practical examples in Python.
☆2,210Dec 19, 2023Updated 2 years ago
Alternatives and similar repositories for malware_showcase
Users that are interested in malware_showcase are comparing it to the libraries listed below
Sorting:
- One of a few malware collections on the GitHub.☆2,748Aug 1, 2025Updated 7 months ago
- Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles☆624Mar 5, 2025Updated last year
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,858Sep 10, 2025Updated 5 months ago
- Rootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Keylogger | Botnets | Worms | Other Network Tools☆186Jan 27, 2021Updated 5 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆75,690Updated this week
- A collection of malware samples caught by several honeypots i manage☆1,794Sep 15, 2021Updated 4 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com☆1,147Apr 14, 2025Updated 10 months ago
- A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and…☆1,563Updated this week
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,940Oct 7, 2023Updated 2 years ago
- 🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware thre…☆1,152Jan 12, 2024Updated 2 years ago
- Codebase to generate an msdt-follina payload☆1,630Jun 8, 2022Updated 3 years ago
- Organized list of my malware development resources☆1,701May 16, 2022Updated 3 years ago
- ☆2,176Oct 22, 2024Updated last year
- ALL IN ONE Hacking Tool For Hackers☆55,123Oct 14, 2025Updated 4 months ago
- A repository full of malware samples.☆1,555Dec 24, 2023Updated 2 years ago
- ☆1,985Jun 25, 2023Updated 2 years ago
- virus collection source code☆501Feb 8, 2023Updated 3 years ago
- Malware samples, analysis exercises and other interesting resources.☆1,614Jan 13, 2024Updated 2 years ago
- The Official USB Rubber Ducky Payload Repository☆5,564Feb 1, 2026Updated last month
- An open-source post-exploitation framework for students, researchers and developers.☆9,436Updated this week
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆69,212Updated this week
- Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickn…☆12,368Aug 25, 2025Updated 6 months ago
- Hunt down social media accounts by username across social networks☆73,309Updated this week
- Defund the Police.☆13,486Jun 7, 2024Updated last year
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,384Updated this week
- Python network worm that spreads on the local network and gives the attacker control of these machines.☆528Oct 5, 2022Updated 3 years ago
- A workshop about Malware Development☆1,765Jun 2, 2023Updated 2 years ago
- A Linux Ransomware☆765Jan 24, 2025Updated last year
- An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any mi…☆15,492Aug 21, 2024Updated last year
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,052Mar 17, 2024Updated last year
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆12,766Nov 19, 2025Updated 3 months ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,424Jan 19, 2025Updated last year
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Jan 14, 2019Updated 7 years ago
- Information gathering framework for phone numbers☆15,957Jan 6, 2026Updated 2 months ago
- A POC Windows crypto-ransomware (Academic). Now Ransom:Win32/MauriCrypt.MK!MTB☆958Nov 17, 2018Updated 7 years ago
- Crypter in Python 3 with advanced functionality, Bypass VM, Encrypt Source with AES & Base64 Encoding | Evil Code is executed by brutefor…☆353Apr 20, 2022Updated 3 years ago
- Python Remote Administration Tool (RAT)☆3,537Jan 4, 2024Updated 2 years ago
- Course materials for Malware Analysis by RPISEC☆4,002Aug 26, 2022Updated 3 years ago
- This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, …☆25,297Feb 27, 2026Updated last week