🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
☆1,155Jan 12, 2024Updated 2 years ago
Alternatives and similar repositories for Malware-Exhibit
Users that are interested in Malware-Exhibit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆80Jan 13, 2024Updated 2 years ago
- 🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation autom…☆180Mar 23, 2024Updated 2 years ago
- A repository full of malware samples.☆1,576Dec 24, 2023Updated 2 years ago
- A collection of malware samples caught by several honeypots i manage☆1,801Sep 15, 2021Updated 4 years ago
- Tips and Tutorials for Bug Bounty and also Penetration Tests.☆1,776Oct 7, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Organized list of my malware development resources☆1,703May 16, 2022Updated 3 years ago
- A Stealthy Trojan Spyware☆1,173Oct 20, 2025Updated 5 months ago
- A large repository of malware samples with 2500+ malware samples & source codes for a variety of platforms by Cryptware Apps.☆547Feb 18, 2026Updated last month
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,906Sep 10, 2025Updated 6 months ago
- This is a repository of resource about Malware techniques☆825Apr 8, 2023Updated 2 years ago
- Tools and Techniques for Red Team / Penetration Testing☆8,608Mar 18, 2025Updated last year
- A workshop about Malware Development☆1,772Jun 2, 2023Updated 2 years ago
- Ransomwares Collection. Don't Run Them on Your Device.☆779May 27, 2025Updated 10 months ago
- Malware samples, analysis exercises and other interesting resources.☆1,623Jan 13, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Collection of various malicious functionality to aid in malware development☆1,863Feb 28, 2024Updated 2 years ago
- Offensive Software Exploitation Course☆2,438May 31, 2023Updated 2 years ago
- Richkware is a modern C++20 framework for building educational malware agents. It provides a comprehensive, secure, and modular architect…☆539Jan 4, 2026Updated 2 months ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,358May 21, 2025Updated 10 months ago
- Leaked pentesting manuals given to Conti ransomware crooks☆1,076Aug 17, 2021Updated 4 years ago
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆933Mar 26, 2024Updated 2 years ago
- A Linux Ransomware☆768Jan 24, 2025Updated last year
- collection of apis used in malware development☆229Aug 2, 2022Updated 3 years ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,918Jun 27, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,901Oct 29, 2025Updated 5 months ago
- A collection of awesome security hardening guides, tools and other resources☆6,235Mar 20, 2026Updated last week
- This map lists the essential techniques to bypass anti-virus and EDR☆3,179Mar 28, 2025Updated last year
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,509Nov 21, 2025Updated 4 months ago
- All about bug bounty (bypasses, payloads, and etc)☆6,679Sep 8, 2023Updated 2 years ago
- ☆138Apr 20, 2023Updated 2 years ago
- Rootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Keylogger | Botnets | Worms | Other Network Tools☆189Jan 27, 2021Updated 5 years ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆277Mar 1, 2021Updated 5 years ago
- The Havoc Framework☆8,256Dec 18, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOp…☆4,911Dec 31, 2025Updated 2 months ago
- Now You See Me, Now You Don't☆1,034Jan 23, 2026Updated 2 months ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,108Mar 17, 2024Updated 2 years ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆10,352Mar 21, 2026Updated last week
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,715Mar 21, 2026Updated last week
- CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system a…☆144Jun 21, 2023Updated 2 years ago
- (THIS CODE IS OUTDATED FOR NEW CHROME VERSIONS) Decrypt chromium based browsers passwords, cookies, credit cards, history, bookmarks, au…☆815Jan 12, 2025Updated last year