A curated collection of awesome malware, botnets, and other post-exploitation tools.
☆269Mar 14, 2021Updated 5 years ago
Alternatives and similar repositories for awesome-malware
Users that are interested in awesome-malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Awesome hacking is an awesome collection of hacking tools.☆14Apr 24, 2019Updated 6 years ago
- A curated list of awesome Tor related projects, articles, papers, etc☆26May 2, 2021Updated 4 years ago
- curated list of open-source anti-censorship tools☆20Mar 31, 2022Updated 3 years ago
- 👩💻🏴 List of awesome Free Software network services and network-capable applications which can be hosted locally.☆36Jun 15, 2021Updated 4 years ago
- 🖥️⚙️ A curated list of amazingly awesome Free Software and Open Source resources for system administrators.☆46Dec 2, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A compendium for self-education geared for "people who do not have computer science degrees."☆99Oct 16, 2020Updated 5 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- A userscript to improve various features of FetLife.com, especially data portability and interoperability functionality.☆10Jun 19, 2014Updated 11 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- A curated list of awesome guides, tools, and other resources related to the security and compromise of locks, safes, and keys.☆1,835Jun 28, 2022Updated 3 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆5,198Jul 15, 2024Updated last year
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆10Jan 20, 2017Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆54Dec 5, 2018Updated 7 years ago
- Simple RAT in C#☆27Apr 11, 2020Updated 5 years ago
- 😈 CAUTION - Malicious files 💀☆48Feb 19, 2026Updated last month
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- Defund the Police.☆13,538Jun 7, 2024Updated last year
- A list of awesome Tor related projects, articles, papers, etc☆485Sep 3, 2023Updated 2 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Bare Bones Banking malware coded for research & educational purposes☆87Aug 24, 2020Updated 5 years ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆982Nov 27, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspace☆28Jan 17, 2021Updated 5 years ago
- Rootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Keylogger | Botnets | Worms | Other Network Tools☆188Jan 27, 2021Updated 5 years ago
- Capture The Flag (CTF) challenges that I've encountered. An "educational purposes only" repository.☆16Apr 14, 2020Updated 5 years ago
- Organized list of my malware development resources☆1,703May 16, 2022Updated 3 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- This is a repository of resource about Malware techniques☆825Apr 8, 2023Updated 2 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆94May 15, 2021Updated 4 years ago
- wifi attacks suite☆59Sep 24, 2020Updated 5 years ago
- 🔥 Pentest Cheat Sheet☆36Aug 10, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Malware exploits☆554Aug 22, 2025Updated 7 months ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Proof of concept denial of service over TOR stress test tool☆42Feb 23, 2026Updated last month
- The future home for a library able to parse in memory lot of complex structures from common shared libs and syscalls☆15Apr 4, 2023Updated 2 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated 2 weeks ago
- A Rust malware controlled by a Go web interface, API and socket server.☆10Aug 22, 2022Updated 3 years ago
- Penetration testing utility and antivirus assessment tool.☆314Apr 25, 2023Updated 2 years ago