PatrikH0lop / malware_showcaseLinks
Understand the nature of malicious software with practical examples in Python.
☆2,130Updated last year
Alternatives and similar repositories for malware_showcase
Users that are interested in malware_showcase are comparing it to the libraries listed below
Sorting:
- Malware programs written in python, reference from PatrikH0lop/malware_showcase☆54Updated 3 years ago
- A repository full of malware samples.☆1,438Updated last year
- ☆746Updated 3 years ago
- Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles☆605Updated 7 months ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,256Updated 4 months ago
- Codebase to generate an msdt-follina payload☆1,625Updated 3 years ago
- ☆2,141Updated 11 months ago
- ☆1,926Updated 2 years ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,353Updated 9 months ago
- 🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware thre…☆1,115Updated last year
- ☆199Updated 3 years ago
- A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side☆4,206Updated last year
- Simple Python SSH Brute Forcing (Credential Stuffing)☆218Updated 2 years ago
- A large repository of malware samples with 2500+ malware samples & source codes for a variety of platforms by Cryptware Apps.☆485Updated 9 months ago
- A Python based RAT 🐀 (Remote Access Trojan) for getting reverse shell 🖥️☆827Updated last year
- Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributions☆2,215Updated last week
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,164Updated last year
- Python network worm that spreads on the local network and gives the attacker control of these machines.☆514Updated 3 years ago
- One of a few malware collections on the GitHub.☆2,649Updated 2 months ago
- Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.☆2,574Updated last year
- Grab cam shots & GPS location from target's phone front camera or PC webcam just sending a link.☆4,047Updated 5 months ago
- ☆117Updated 2 years ago
- Create a USB Rubber Ducky like device using a Raspberry PI Pico☆2,945Updated 6 months ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆2,250Updated last year
- A workshop about Malware Development☆1,713Updated 2 years ago
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆1,924Updated last year
- These are the labs for my Intro class. Yes, this is public. Yes, this is intentional.☆1,711Updated this week
- Ransom0 is a open source ransomware made with Python, designed to find and encrypt user data.☆356Updated 2 months ago
- A communal outpouring of online resources for learning different things in cybersecurity☆457Updated 4 years ago
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆167Updated 4 months ago