This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY
☆3,291Sep 4, 2022Updated 3 years ago
Alternatives and similar repositories for botnets
Users that are interested in botnets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Botnet☆948Feb 8, 2023Updated 3 years ago
- HTTP Botnet☆923Oct 27, 2020Updated 5 years ago
- Python botnet and backdoor☆1,617Mar 2, 2023Updated 3 years ago
- An open-source post-exploitation framework for students, researchers and developers.☆9,461Apr 2, 2026Updated 3 weeks ago
- Reverse Engineering Tutorials☆526Sep 2, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about…☆1,556Dec 8, 2020Updated 5 years ago
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆12,962Apr 1, 2026Updated 3 weeks ago
- Second Version of The GoBot Botnet, But more advanced.☆758Sep 24, 2021Updated 4 years ago
- A collection of malware samples caught by several honeypots i manage☆1,808Sep 15, 2021Updated 4 years ago
- RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware☆1,047Jun 3, 2021Updated 4 years ago
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposes☆570Feb 17, 2017Updated 9 years ago
- hacking-tutorials☆360Apr 16, 2021Updated 5 years ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆9,277Oct 16, 2025Updated 6 months ago
- Qbot Botnet. Telnet botnet, most powerfull and strong botnet. requirements: 2 linux server.☆184Oct 6, 2016Updated 9 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Automated Mass Exploiter☆5,229May 22, 2023Updated 2 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,172Mar 17, 2024Updated 2 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com☆1,163Apr 14, 2025Updated last year
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,997Sep 10, 2025Updated 7 months ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,975Mar 22, 2024Updated 2 years ago
- Richkware is a modern C++20 framework for building educational malware agents. It provides a comprehensive, secure, and modular architect…☆540Jan 4, 2026Updated 3 months ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,933Apr 1, 2026Updated 3 weeks ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,462Nov 3, 2018Updated 7 years ago
- UFONet - Denial of Service Toolkit☆2,452Aug 23, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A collection of source code for various botnets.☆565Oct 9, 2019Updated 6 years ago
- Defund the Police.☆13,686Jun 7, 2024Updated last year
- Malware sample library.☆597Nov 21, 2023Updated 2 years ago
- Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, ad…☆1,015Oct 3, 2024Updated last year
- Official Black Hat Arsenal Security Tools Repository☆4,263Aug 26, 2024Updated last year
- virus collection source code☆512Feb 8, 2023Updated 3 years ago
- A collection of hacking / penetration testing resources to make you better!☆16,964Mar 12, 2024Updated 2 years ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,530Apr 17, 2025Updated last year
- Most advanced XSS scanner.☆14,913Apr 26, 2025Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Build a basic Command & Control botnet in C☆399Oct 27, 2020Updated 5 years ago
- Exploitation Framework for Embedded Devices☆13,083Mar 2, 2026Updated last month
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,655Jun 20, 2024Updated last year
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,910Jan 24, 2024Updated 2 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,832Jan 19, 2020Updated 6 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,406Feb 10, 2021Updated 5 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,272Sep 29, 2025Updated 6 months ago