🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
☆1,166Jan 12, 2024Updated 2 years ago
Alternatives and similar repositories for Malware-Exhibit
Users that are interested in Malware-Exhibit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆81Jan 13, 2024Updated 2 years ago
- 🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation autom…☆184Mar 23, 2024Updated 2 years ago
- A repository full of malware samples.☆1,615Dec 24, 2023Updated 2 years ago
- A collection of malware samples caught by several honeypots i manage☆1,820Sep 15, 2021Updated 4 years ago
- Curated resources for malware analysis, reverse engineering, and defensive security research.☆1,726Apr 1, 2026Updated last month
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Tips and Tutorials for Bug Bounty and also Penetration Tests.☆1,943Oct 7, 2025Updated 7 months ago
- A large repository of malware samples with 2500+ malware samples & source codes for a variety of platforms by Cryptware Apps.☆565Feb 18, 2026Updated 3 months ago
- A Stealthy Trojan Spyware☆1,202Oct 20, 2025Updated 7 months ago
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆18,233Sep 10, 2025Updated 8 months ago
- This is a repository of resource about Malware techniques☆859Apr 8, 2023Updated 3 years ago
- Tools and Techniques for Red Team / Penetration Testing☆8,731Apr 18, 2026Updated last month
- A workshop about Malware Development☆1,783Jun 2, 2023Updated 2 years ago
- Ransomwares Collection. Don't Run Them on Your Device.☆809May 27, 2025Updated 11 months ago
- Malware samples, analysis exercises and other interesting resources.☆1,635Jan 13, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Collection of various malicious functionality to aid in malware development☆1,891Feb 28, 2024Updated 2 years ago
- Offensive Software Exploitation Course☆2,513May 31, 2023Updated 2 years ago
- Richkware is a modern C++20 framework for building educational malware agents. It provides a comprehensive, secure, and modular architect…☆539Jan 4, 2026Updated 4 months ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,383May 21, 2025Updated last year
- Leaked pentesting manuals given to Conti ransomware crooks☆1,086Aug 17, 2021Updated 4 years ago
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆935Mar 26, 2024Updated 2 years ago
- A Linux Ransomware☆777Jan 24, 2025Updated last year
- collection of apis used in malware development☆231Aug 2, 2022Updated 3 years ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,945Jun 27, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,913Oct 29, 2025Updated 6 months ago
- A collection of awesome security hardening guides, tools and other resources☆6,325May 5, 2026Updated 2 weeks ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,261Mar 28, 2025Updated last year
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,518Nov 21, 2025Updated 6 months ago
- ☆138Apr 20, 2023Updated 3 years ago
- All about bug bounty (bypasses, payloads, and etc)☆6,742Sep 8, 2023Updated 2 years ago
- The Havoc Framework☆8,361Dec 18, 2025Updated 5 months ago
- Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOp…☆4,958Apr 23, 2026Updated 3 weeks ago
- Rootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Keylogger | Botnets | Worms | Other Network Tools☆191Jan 27, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PowerShell Ransomware Simulator with C2 Server☆504Jan 2, 2026Updated 4 months ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆284Mar 1, 2021Updated 5 years ago
- Now You See Me, Now You Don't☆1,046Jan 23, 2026Updated 3 months ago
- A Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jam…☆637May 11, 2026Updated last week
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,222Mar 17, 2024Updated 2 years ago
- CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system a…☆144Jun 21, 2023Updated 2 years ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆10,631Updated this week