This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY
☆3,290Sep 4, 2022Updated 3 years ago
Alternatives and similar repositories for botnets
Users that are interested in botnets are comparing it to the libraries listed below
Sorting:
- Botnet☆939Feb 8, 2023Updated 3 years ago
- HTTP Botnet☆915Oct 27, 2020Updated 5 years ago
- An open-source post-exploitation framework for students, researchers and developers.☆9,431Feb 20, 2026Updated last week
- Python botnet and backdoor☆1,612Mar 2, 2023Updated 2 years ago
- Reverse Engineering Tutorials☆525Sep 2, 2018Updated 7 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about…☆1,540Dec 8, 2020Updated 5 years ago
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆12,735Nov 19, 2025Updated 3 months ago
- A collection of malware samples caught by several honeypots i manage☆1,794Sep 15, 2021Updated 4 years ago
- Automated Mass Exploiter☆5,211May 22, 2023Updated 2 years ago
- RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware☆1,034Jun 3, 2021Updated 4 years ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆9,181Oct 16, 2025Updated 4 months ago
- Second Version of The GoBot Botnet, But more advanced.☆757Sep 24, 2021Updated 4 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,043Mar 17, 2024Updated last year
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposes☆570Feb 17, 2017Updated 9 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,943Mar 22, 2024Updated last year
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,858Sep 10, 2025Updated 5 months ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,437Nov 3, 2018Updated 7 years ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,595Jun 20, 2024Updated last year
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,861Feb 1, 2026Updated last month
- Official Black Hat Arsenal Security Tools Repository☆4,231Aug 26, 2024Updated last year
- Defund the Police.☆13,472Jun 7, 2024Updated last year
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,504Apr 17, 2025Updated 10 months ago
- Exploitation Framework for Embedded Devices☆13,002Jun 10, 2025Updated 8 months ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com☆1,148Apr 14, 2025Updated 10 months ago
- Most advanced XSS scanner.☆14,773Apr 26, 2025Updated 10 months ago
- A collection of hacking / penetration testing resources to make you better!☆16,820Mar 12, 2024Updated last year
- A collection of source code for various botnets.☆567Oct 9, 2019Updated 6 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,818Jan 19, 2020Updated 6 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,392Feb 10, 2021Updated 5 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,150Sep 29, 2025Updated 5 months ago
- Malware sample library.☆593Nov 21, 2023Updated 2 years ago
- Like nmap for mapping wifi networks you're not connected to, plus device tracking☆2,715Jan 16, 2024Updated 2 years ago
- Richkware is a modern C++20 framework for building educational malware agents. It provides a comprehensive, secure, and modular architect…☆537Jan 4, 2026Updated last month
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,900Jan 24, 2024Updated 2 years ago
- Qbot Botnet. Telnet botnet, most powerfull and strong botnet. requirements: 2 linux server.☆183Oct 6, 2016Updated 9 years ago
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,514Jun 10, 2025Updated 8 months ago
- UAC bypass, Elevate, Persistence methods☆2,739Feb 13, 2023Updated 3 years ago
- Course materials for Malware Analysis by RPISEC☆4,001Aug 26, 2022Updated 3 years ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆18,860Dec 31, 2025Updated 2 months ago