A curated collection of awesome malware, botnets, and other post-exploitation tools.
☆269Mar 14, 2021Updated 4 years ago
Alternatives and similar repositories for awesome-malware
Users that are interested in awesome-malware are comparing it to the libraries listed below
Sorting:
- Awesome hacking is an awesome collection of hacking tools.☆14Apr 24, 2019Updated 6 years ago
- Curated list of awesome lists☆15Nov 28, 2020Updated 5 years ago
- A curated list of awesome Tor related projects, articles, papers, etc☆26May 2, 2021Updated 4 years ago
- curated list of open-source anti-censorship tools☆20Mar 31, 2022Updated 3 years ago
- ⚔️ A collection of awesome penetration testing resources, tools, and other shiny things.☆269Oct 23, 2023Updated 2 years ago
- 👩💻🏴 List of awesome Free Software network services and network-capable applications which can be hosted locally.☆36Jun 15, 2021Updated 4 years ago
- 🖥️⚙️ A curated list of amazingly awesome Free Software and Open Source resources for system administrators.☆46Dec 2, 2020Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- A compendium for self-education geared for "people who do not have computer science degrees."☆99Oct 16, 2020Updated 5 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- A curated list of awesome guides, tools, and other resources related to the security and compromise of locks, safes, and keys.☆1,817Jun 28, 2022Updated 3 years ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆5,167Jul 15, 2024Updated last year
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- 😈 CAUTION - Malicious files 💀☆47Feb 19, 2026Updated last week
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆54Dec 5, 2018Updated 7 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- Defund the Police.☆13,486Jun 7, 2024Updated last year
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- A Debian package that provides information about the Tarot and various Tarot decks as a UNIX-like manual page.☆19Feb 10, 2021Updated 5 years ago
- DNS over HTTPS targeted malware (only runs once)☆96Aug 16, 2023Updated 2 years ago
- A list of awesome Tor related projects, articles, papers, etc☆481Sep 3, 2023Updated 2 years ago
- Simple RAT in C#☆27Apr 11, 2020Updated 5 years ago
- Rootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Keylogger | Botnets | Worms | Other Network Tools☆186Jan 27, 2021Updated 5 years ago
- Proof of concept denial of service over TOR stress test tool☆42Feb 23, 2026Updated last week
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- A userscript to improve various features of FetLife.com, especially data portability and interoperability functionality.☆10Jun 19, 2014Updated 11 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆93May 15, 2021Updated 4 years ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆976Nov 27, 2023Updated 2 years ago
- [WIP] A free and open-source, modular Remote Administration Tool (RAT) / Payload Dropper written in Go(lang) with a flexible command and …☆230Dec 3, 2023Updated 2 years ago
- Organized list of my malware development resources☆1,701May 16, 2022Updated 3 years ago
- this repo is to cover the other undocumented or published / in different langaue to achieve shellcode injection via windows callback func…☆88Jun 24, 2022Updated 3 years ago
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆10Jan 20, 2017Updated 9 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- Additional aliases for scoop to ease updating and searching for apps.☆13Nov 12, 2020Updated 5 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- 🔅 Reverse shell written on python3☆14Dec 12, 2020Updated 5 years ago