🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
☆1,152Jan 12, 2024Updated 2 years ago
Alternatives and similar repositories for Malware-Exhibit
Users that are interested in Malware-Exhibit are comparing it to the libraries listed below
Sorting:
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆79Jan 13, 2024Updated 2 years ago
- 🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation autom…☆182Mar 23, 2024Updated last year
- A repository full of malware samples.☆1,555Dec 24, 2023Updated 2 years ago
- A collection of malware samples caught by several honeypots i manage☆1,795Sep 15, 2021Updated 4 years ago
- Organized list of my malware development resources☆1,701May 16, 2022Updated 3 years ago
- Tips and Tutorials for Bug Bounty and also Penetration Tests.☆1,707Oct 7, 2025Updated 5 months ago
- This is a repository of resource about Malware techniques☆825Apr 8, 2023Updated 2 years ago
- A large repository of malware samples with 2500+ malware samples & source codes for a variety of platforms by Cryptware Apps.☆533Feb 18, 2026Updated 2 weeks ago
- A workshop about Malware Development☆1,765Jun 2, 2023Updated 2 years ago
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,867Sep 10, 2025Updated 5 months ago
- A Stealthy Trojan Spyware☆1,170Oct 20, 2025Updated 4 months ago
- Tools and Techniques for Red Team / Penetration Testing☆8,548Mar 18, 2025Updated 11 months ago
- Malware samples, analysis exercises and other interesting resources.☆1,614Jan 13, 2024Updated 2 years ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,347May 21, 2025Updated 9 months ago
- Collection of various malicious functionality to aid in malware development☆1,845Feb 28, 2024Updated 2 years ago
- Ransomwares Collection. Don't Run Them on Your Device.☆768May 27, 2025Updated 9 months ago
- Leaked pentesting manuals given to Conti ransomware crooks☆1,074Aug 17, 2021Updated 4 years ago
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆931Mar 26, 2024Updated last year
- Offensive Software Exploitation Course☆2,393May 31, 2023Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,166Mar 28, 2025Updated 11 months ago
- ☆138Apr 20, 2023Updated 2 years ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,900Oct 29, 2025Updated 4 months ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,904Jun 27, 2023Updated 2 years ago
- Malware Sample Sources☆610Feb 6, 2021Updated 5 years ago
- Richkware is a modern C++20 framework for building educational malware agents. It provides a comprehensive, secure, and modular architect…☆539Jan 4, 2026Updated 2 months ago
- Now You See Me, Now You Don't☆1,027Jan 23, 2026Updated last month
- The Havoc Framework☆8,203Dec 18, 2025Updated 2 months ago
- Nidhogg is an all-in-one simple to use windows kernel rootkit.☆2,276Feb 15, 2026Updated 3 weeks ago
- All-in-One malware analysis tool.☆1,963Updated this week
- collection of apis used in malware development☆229Aug 2, 2022Updated 3 years ago
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,506Nov 21, 2025Updated 3 months ago
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,633Mar 1, 2026Updated last week
- Research code & papers from members of vx-underground.☆1,352Dec 7, 2021Updated 4 years ago
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆316Nov 29, 2025Updated 3 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,511Jan 18, 2026Updated last month
- PowerShell Ransomware Simulator with C2 Server☆498Jan 2, 2026Updated 2 months ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆10,271Jan 25, 2026Updated last month
- All about bug bounty (bypasses, payloads, and etc)☆6,658Sep 8, 2023Updated 2 years ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆784Jun 23, 2023Updated 2 years ago