Understand the nature of malicious software with practical examples in Python.
☆2,219Dec 19, 2023Updated 2 years ago
Alternatives and similar repositories for malware_showcase
Users that are interested in malware_showcase are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- One of a few malware collections on the GitHub.☆2,751Aug 1, 2025Updated 7 months ago
- Rootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Keylogger | Botnets | Worms | Other Network Tools☆188Jan 27, 2021Updated 5 years ago
- Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles☆625Mar 5, 2025Updated last year
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,891Sep 10, 2025Updated 6 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,293Mar 16, 2026Updated last week
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com☆1,154Apr 14, 2025Updated 11 months ago
- A collection of malware samples caught by several honeypots i manage☆1,801Sep 15, 2021Updated 4 years ago
- ☆1,990Jun 25, 2023Updated 2 years ago
- A repository full of malware samples.☆1,573Dec 24, 2023Updated 2 years ago
- 🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware thre…☆1,155Jan 12, 2024Updated 2 years ago
- Codebase to generate an msdt-follina payload☆1,633Jun 8, 2022Updated 3 years ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,941Oct 7, 2023Updated 2 years ago
- Organized list of my malware development resources☆1,703May 16, 2022Updated 3 years ago
- virus collection source code☆504Feb 8, 2023Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Defund the Police.☆13,538Jun 7, 2024Updated last year
- An open-source post-exploitation framework for students, researchers and developers.☆9,448Mar 20, 2026Updated last week
- ☆2,175Oct 22, 2024Updated last year
- The Official USB Rubber Ducky Payload Repository☆5,604Mar 20, 2026Updated last week
- A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and…☆1,565Updated this week
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆69,663Updated this week
- ALL IN ONE Hacking Tool For Hackers☆55,273Mar 15, 2026Updated last week
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆12,847Nov 19, 2025Updated 4 months ago
- Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickn…☆12,483Aug 25, 2025Updated 7 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Malware samples, analysis exercises and other interesting resources.☆1,623Jan 13, 2024Updated 2 years ago
- A workshop about Malware Development☆1,772Jun 2, 2023Updated 2 years ago
- A Linux Ransomware☆768Jan 24, 2025Updated last year
- Hunt down social media accounts by username across social networks☆73,965Updated this week
- Course materials for Malware Analysis by RPISEC☆4,004Aug 26, 2022Updated 3 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,539Mar 20, 2026Updated last week
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,098Mar 17, 2024Updated 2 years ago
- Python network worm that spreads on the local network and gives the attacker control of these machines.☆528Oct 5, 2022Updated 3 years ago
- A POC Windows crypto-ransomware (Academic). Now Ransom:Win32/MauriCrypt.MK!MTB☆959Nov 17, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Python Remote Administration Tool (RAT)☆3,564Jan 4, 2024Updated 2 years ago
- Create a USB Rubber Ducky like device using a Raspberry PI Pico☆3,163Mar 18, 2026Updated last week
- ☆124Mar 20, 2024Updated 2 years ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆25Dec 14, 2021Updated 4 years ago
- Information gathering framework for phone numbers☆16,068Jan 6, 2026Updated 2 months ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,434Jan 19, 2025Updated last year