🔬Collection of malware, ransomware, RATs, botnets, stealers, etc.
☆242Dec 15, 2021Updated 4 years ago
Alternatives and similar repositories for Malware-collection
Users that are interested in Malware-collection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Best Private RAT in 2022! HVNC (no shitty Tinynuke) | STEALER | | CLIPPER | | HRDP | | KEYLOGGER |☆11Sep 10, 2022Updated 3 years ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆78Oct 2, 2025Updated 6 months ago
- A Python-based backdoor and server communication tool for ethical hacking and reverse shell practice using socket programming.☆28May 21, 2025Updated 10 months ago
- Usage of WH-HackerExploit Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility …☆39Jul 28, 2022Updated 3 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A collection of malware samples.☆39Dec 5, 2017Updated 8 years ago
- ☆51Apr 25, 2025Updated 11 months ago
- Source code of Claw Key logger previously sold on HackForums☆57Aug 6, 2022Updated 3 years ago
- A collection of BASH-Python scripts for different scenarios using loops, field processors and clever commands.☆33Jun 25, 2018Updated 7 years ago
- This IP2Location Nmap script provides a fast lookup of country, region, city, latitude, longitude, ZIP code, time zone, ISP, domain name,…☆19Dec 31, 2025Updated 3 months ago
- Nmap script that scans for probable vulnerabilities based on services discovered in open ports.☆222Mar 16, 2025Updated last year
- David is a very funny man☆10Feb 19, 2021Updated 5 years ago
- 💥 Implementation of zip bomb, using python script.☆12Dec 18, 2021Updated 4 years ago
- Reverse proxies cheatsheet☆26Nov 4, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Some ELF Malwares☆10Mar 11, 2022Updated 4 years ago
- Here are +200 different rats some with source code☆156Oct 3, 2023Updated 2 years ago
- Command line Remote Access tool (RAT) targeting Windows Systems.☆16Sep 16, 2019Updated 6 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- ☆13Sep 26, 2020Updated 5 years ago
- GUI project for steghide☆18Aug 28, 2018Updated 7 years ago
- A experimental cli tool to encrypt & decrypt files/directories.☆35Dec 30, 2025Updated 3 months ago
- $h!tty Skidded malwares I found online (warning - very cringe) Disclaimer: Most of them still dangerous. This repo is for educational pur…☆29Oct 12, 2023Updated 2 years ago
- Rootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Keylogger | Botnets | Worms | Other Network Tools☆190Jan 27, 2021Updated 5 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Leaked source code of the babuk ransomware by VXUG☆288Sep 11, 2023Updated 2 years ago
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Oct 13, 2021Updated 4 years ago
- OsintIA_Tools.py is an automated tool for collecting and analyzing public information that combines OSINT techniques with artificial inte…☆62Mar 11, 2025Updated last year
- RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware☆1,042Jun 3, 2021Updated 4 years ago
- 💻 Windows 10 Kernel-mode rootkit☆31Sep 3, 2022Updated 3 years ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆208Mar 6, 2025Updated last year
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- ☆17Nov 17, 2025Updated 5 months ago
- ☆13Jul 1, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Conti Ransomware Source Code☆19Mar 1, 2022Updated 4 years ago
- Ransomwares Collection. Don't Run Them on Your Device.☆785May 27, 2025Updated 10 months ago
- Source code of the Rensenware ransomware in .NET☆20Jul 24, 2021Updated 4 years ago
- Nautilus is a Rust-based framework for building decentralized networks and secure communication systems. It focuses on modularity, scalab…☆31Mar 5, 2025Updated last year
- Разные полезные скрипты для работы в Linux, на Python и на bash, сброс ключей IDE от JetBrains для бесплатного использования.☆45Sep 23, 2021Updated 4 years ago
- ☆19Jul 29, 2022Updated 3 years ago
- A curated collection of awesome malware, botnets, and other post-exploitation tools.☆267Mar 14, 2021Updated 5 years ago