🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
☆1,156Jan 12, 2024Updated 2 years ago
Alternatives and similar repositories for Malware-Exhibit
Users that are interested in Malware-Exhibit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆80Jan 13, 2024Updated 2 years ago
- 🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation autom…☆180Mar 23, 2024Updated 2 years ago
- A repository full of malware samples.☆1,588Dec 24, 2023Updated 2 years ago
- A collection of malware samples caught by several honeypots i manage☆1,806Sep 15, 2021Updated 4 years ago
- Tips and Tutorials for Bug Bounty and also Penetration Tests.☆1,877Oct 7, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Organized list of my malware development resources☆1,711Apr 1, 2026Updated 2 weeks ago
- A Stealthy Trojan Spyware☆1,176Oct 20, 2025Updated 5 months ago
- A large repository of malware samples with 2500+ malware samples & source codes for a variety of platforms by Cryptware Apps.☆550Feb 18, 2026Updated 2 months ago
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,977Sep 10, 2025Updated 7 months ago
- This is a repository of resource about Malware techniques☆857Apr 8, 2023Updated 3 years ago
- Tools and Techniques for Red Team / Penetration Testing☆8,661Mar 18, 2025Updated last year
- A workshop about Malware Development☆1,774Jun 2, 2023Updated 2 years ago
- Ransomwares Collection. Don't Run Them on Your Device.☆785May 27, 2025Updated 10 months ago
- Malware samples, analysis exercises and other interesting resources.☆1,625Jan 13, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Collection of various malicious functionality to aid in malware development☆1,870Feb 28, 2024Updated 2 years ago
- Offensive Software Exploitation Course☆2,512May 31, 2023Updated 2 years ago
- Richkware is a modern C++20 framework for building educational malware agents. It provides a comprehensive, secure, and modular architect…☆539Jan 4, 2026Updated 3 months ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,367May 21, 2025Updated 10 months ago
- Leaked pentesting manuals given to Conti ransomware crooks☆1,074Aug 17, 2021Updated 4 years ago
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆933Mar 26, 2024Updated 2 years ago
- Malware Sample Sources☆614Feb 6, 2021Updated 5 years ago
- A Linux Ransomware☆772Jan 24, 2025Updated last year
- collection of apis used in malware development☆231Aug 2, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,930Jun 27, 2023Updated 2 years ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,905Oct 29, 2025Updated 5 months ago
- A collection of awesome security hardening guides, tools and other resources☆6,264Mar 20, 2026Updated 3 weeks ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,186Mar 28, 2025Updated last year
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,513Nov 21, 2025Updated 4 months ago
- ☆138Apr 20, 2023Updated 2 years ago
- All about bug bounty (bypasses, payloads, and etc)☆6,699Sep 8, 2023Updated 2 years ago
- The Havoc Framework☆8,274Dec 18, 2025Updated 4 months ago
- Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOp…☆4,922Dec 31, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Rootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Keylogger | Botnets | Worms | Other Network Tools☆190Jan 27, 2021Updated 5 years ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆277Mar 1, 2021Updated 5 years ago
- A Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jam…☆630Apr 9, 2026Updated last week
- Now You See Me, Now You Don't☆1,042Jan 23, 2026Updated 2 months ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,133Mar 17, 2024Updated 2 years ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆10,453Apr 8, 2026Updated last week
- CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system a…☆144Jun 21, 2023Updated 2 years ago