A curated collection of awesome malware, botnets, and other post-exploitation tools.
☆267Mar 14, 2021Updated 5 years ago
Alternatives and similar repositories for awesome-malware
Users that are interested in awesome-malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Curated list of awesome lists☆16Nov 28, 2020Updated 5 years ago
- Awesome hacking is an awesome collection of hacking tools.☆14Apr 24, 2019Updated 7 years ago
- A curated list of awesome Tor related projects, articles, papers, etc☆26May 2, 2021Updated 5 years ago
- curated list of open-source anti-censorship tools☆20Mar 31, 2022Updated 4 years ago
- ⚔️ A collection of awesome penetration testing resources, tools, and other shiny things.☆274Oct 23, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 🖥️⚙️ A curated list of amazingly awesome Free Software and Open Source resources for system administrators.☆47Dec 2, 2020Updated 5 years ago
- A compendium for self-education geared for "people who do not have computer science degrees."☆100Oct 16, 2020Updated 5 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- A userscript to improve various features of FetLife.com, especially data portability and interoperability functionality.☆10Jun 19, 2014Updated 11 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- A curated list of awesome guides, tools, and other resources related to the security and compromise of locks, safes, and keys.☆1,859Jun 28, 2022Updated 3 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆5,265Jul 15, 2024Updated last year
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆10Jan 20, 2017Updated 9 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆54Dec 5, 2018Updated 7 years ago
- Simple RAT in C#☆26Apr 11, 2020Updated 6 years ago
- 😈 CAUTION - Malicious files 💀☆49Feb 19, 2026Updated 2 months ago
- This tool is designed for those situations during a pentest where you have upload access to a webserver that’s running PHP. Upload this …☆23Aug 6, 2024Updated last year
- Defund the Police.☆13,702Jun 7, 2024Updated last year
- A list of awesome Tor related projects, articles, papers, etc☆490Sep 3, 2023Updated 2 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Organized list of my malware development resources☆1,720Apr 1, 2026Updated last month
- Bare Bones Banking malware coded for research & educational purposes☆87Aug 24, 2020Updated 5 years ago
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspace☆28Jan 17, 2021Updated 5 years ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆990Nov 27, 2023Updated 2 years ago
- Rootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Keylogger | Botnets | Worms | Other Network Tools☆190Jan 27, 2021Updated 5 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- This is a repository of resource about Malware techniques☆858Apr 8, 2023Updated 3 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆94May 15, 2021Updated 4 years ago
- 🔥 Pentest Cheat Sheet☆36Aug 10, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Proof of concept denial of service over TOR stress test tool☆43Feb 23, 2026Updated 2 months ago
- The future home for a library able to parse in memory lot of complex structures from common shared libs and syscalls☆15Apr 4, 2023Updated 3 years ago
- Malware exploits☆560Aug 22, 2025Updated 8 months ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated last month
- A Rust malware controlled by a Go web interface, API and socket server.☆10Aug 22, 2022Updated 3 years ago
- Penetration testing utility and antivirus assessment tool.☆314Apr 25, 2023Updated 3 years ago