🔬Collection of malware, ransomware, RATs, botnets, stealers, etc.
☆246Dec 15, 2021Updated 4 years ago
Alternatives and similar repositories for Malware-collection
Users that are interested in Malware-collection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Best Private RAT in 2022! HVNC (no shitty Tinynuke) | STEALER | | CLIPPER | | HRDP | | KEYLOGGER |☆11Sep 10, 2022Updated 3 years ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆80Oct 2, 2025Updated 7 months ago
- A Python-based backdoor and server communication tool for ethical hacking and reverse shell practice using socket programming.☆28May 21, 2025Updated 11 months ago
- Usage of WH-HackerExploit Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility …☆39Jul 28, 2022Updated 3 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆51Apr 25, 2025Updated last year
- ☆19Dec 23, 2024Updated last year
- Source code of Claw Key logger previously sold on HackForums☆57Aug 6, 2022Updated 3 years ago
- This IP2Location Nmap script provides a fast lookup of country, region, city, latitude, longitude, ZIP code, time zone, ISP, domain name,…☆19Dec 31, 2025Updated 4 months ago
- A collection of BASH-Python scripts for different scenarios using loops, field processors and clever commands.☆33Jun 25, 2018Updated 7 years ago
- Nmap script that scans for probable vulnerabilities based on services discovered in open ports.☆223Mar 16, 2025Updated last year
- David is a very funny man☆10Feb 19, 2021Updated 5 years ago
- Decompiled NotPetya File Encryptor Code☆18Aug 23, 2022Updated 3 years ago
- Reverse proxies cheatsheet☆26Nov 4, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Some ELF Malwares☆10Mar 11, 2022Updated 4 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- Here are +200 different rats some with source code☆160Oct 3, 2023Updated 2 years ago
- GUI project for steghide☆18Aug 28, 2018Updated 7 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated 2 years ago
- A experimental cli tool to encrypt & decrypt files/directories.☆35Dec 30, 2025Updated 4 months ago
- $h!tty Skidded malwares I found online (warning - very cringe) Disclaimer: Most of them still dangerous. This repo is for educational pur…☆29Oct 12, 2023Updated 2 years ago
- Leaked source code of the babuk ransomware by VXUG☆294Sep 11, 2023Updated 2 years ago
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Oct 13, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 💻 Windows 10 Kernel-mode rootkit☆31Sep 3, 2022Updated 3 years ago
- RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware☆1,045Jun 3, 2021Updated 4 years ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆208Mar 6, 2025Updated last year
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- ☆13Jul 1, 2022Updated 3 years ago
- Conti Ransomware Source Code☆19Mar 1, 2022Updated 4 years ago
- Ransomwares Collection. Don't Run Them on Your Device.☆799May 27, 2025Updated 11 months ago
- Source code of the Rensenware ransomware in .NET☆20Jul 24, 2021Updated 4 years ago
- Nautilus is a Rust-based framework for building decentralized networks and secure communication systems. It focuses on modularity, scalab…☆31Mar 5, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Разные полезные скрипты для работы в Linux, на Python и на bash, сброс ключей IDE от JetBrains для бесплатного использования.☆44Sep 23, 2021Updated 4 years ago
- A curated collection of awesome malware, botnets, and other post-exploitation tools.☆267Mar 14, 2021Updated 5 years ago
- ☆19Jul 29, 2022Updated 3 years ago
- A full rewrite of Red Petya ransomware from 2016 with full MBR and GPT support☆23Jul 12, 2022Updated 3 years ago
- conti locker ransomware source code leak☆31Mar 5, 2022Updated 4 years ago
- A cloud based remote android managment suite, powered by NodeJS☆26Dec 12, 2022Updated 3 years ago
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year