🔬Collection of malware, ransomware, RATs, botnets, stealers, etc.
☆237Dec 15, 2021Updated 4 years ago
Alternatives and similar repositories for Malware-collection
Users that are interested in Malware-collection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Best Private RAT in 2022! HVNC (no shitty Tinynuke) | STEALER | | CLIPPER | | HRDP | | KEYLOGGER |☆12Sep 10, 2022Updated 3 years ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆76Oct 2, 2025Updated 5 months ago
- A Python-based backdoor and server communication tool for ethical hacking and reverse shell practice using socket programming.☆28May 21, 2025Updated 10 months ago
- Usage of WH-HackerExploit Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility …☆40Jul 28, 2022Updated 3 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A collection of malware samples.☆39Dec 5, 2017Updated 8 years ago
- ☆51Apr 25, 2025Updated 11 months ago
- ☆18Dec 23, 2024Updated last year
- Source code of Claw Key logger previously sold on HackForums☆58Aug 6, 2022Updated 3 years ago
- A collection of BASH-Python scripts for different scenarios using loops, field processors and clever commands.☆33Jun 25, 2018Updated 7 years ago
- This IP2Location Nmap script provides a fast lookup of country, region, city, latitude, longitude, ZIP code, time zone, ISP, domain name,…☆19Dec 31, 2025Updated 2 months ago
- Nmap script that scans for probable vulnerabilities based on services discovered in open ports.☆222Mar 16, 2025Updated last year
- David is a very funny man☆10Feb 19, 2021Updated 5 years ago
- Decompiled NotPetya File Encryptor Code☆18Aug 23, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Reverse proxies cheatsheet☆26Nov 4, 2023Updated 2 years ago
- Here are +200 different rats some with source code☆155Oct 3, 2023Updated 2 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 4 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- ☆13Sep 26, 2020Updated 5 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- A experimental cli tool to encrypt & decrypt files/directories.☆35Dec 30, 2025Updated 2 months ago
- $h!tty Skidded malwares I found online (warning - very cringe) Disclaimer: Most of them still dangerous. This repo is for educational pur…☆30Oct 12, 2023Updated 2 years ago
- RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware☆1,040Jun 3, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- 💻 Windows 10 Kernel-mode rootkit☆31Sep 3, 2022Updated 3 years ago
- OsintIA_Tools.py is an automated tool for collecting and analyzing public information that combines OSINT techniques with artificial inte…☆62Mar 11, 2025Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆207Mar 6, 2025Updated last year
- ☆17Nov 17, 2025Updated 4 months ago
- Conti Ransomware Source Code☆19Mar 1, 2022Updated 4 years ago
- Ransomwares Collection. Don't Run Them on Your Device.☆779May 27, 2025Updated 10 months ago
- conti locker ransomware source code leak☆30Mar 5, 2022Updated 4 years ago
- Source code of the Rensenware ransomware in .NET☆21Jul 24, 2021Updated 4 years ago
- Nautilus is a Rust-based framework for building decentralized networks and secure communication systems. It focuses on modularity, scalab…☆31Mar 5, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Разные полезные скрипты для работы в Linux, на Python и на bash, сброс ключей IDE от JetBrains для бесплатного использования.☆44Sep 23, 2021Updated 4 years ago
- ☆19Jul 29, 2022Updated 3 years ago
- reverse engineering random malwares☆23Mar 12, 2026Updated 2 weeks ago
- A full rewrite of Red Petya ransomware from 2016 with full MBR and GPT support☆24Jul 12, 2022Updated 3 years ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆29Apr 21, 2025Updated 11 months ago
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- vex - an asynchronous reverse connection helper for SOCKS4/5 proxies.☆16Feb 27, 2020Updated 6 years ago