This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY
☆3,307Sep 4, 2022Updated 3 years ago
Alternatives and similar repositories for botnets
Users that are interested in botnets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Botnet☆948Feb 8, 2023Updated 3 years ago
- HTTP Botnet☆925Oct 27, 2020Updated 5 years ago
- Python botnet and backdoor☆1,620Mar 2, 2023Updated 3 years ago
- An open-source post-exploitation framework for students, researchers and developers.☆9,473May 9, 2026Updated last week
- Reverse Engineering Tutorials☆528Sep 2, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about…☆1,558Dec 8, 2020Updated 5 years ago
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆12,995Apr 1, 2026Updated last month
- Second Version of The GoBot Botnet, But more advanced.☆757Sep 24, 2021Updated 4 years ago
- A collection of malware samples caught by several honeypots i manage☆1,820Sep 15, 2021Updated 4 years ago
- RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware☆1,043Jun 3, 2021Updated 4 years ago
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposes☆572Feb 17, 2017Updated 9 years ago
- hacking-tutorials☆363Apr 16, 2021Updated 5 years ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆9,311Oct 16, 2025Updated 7 months ago
- Qbot Botnet. Telnet botnet, most powerfull and strong botnet. requirements: 2 linux server.☆184Oct 6, 2016Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Automated Mass Exploiter☆5,239May 22, 2023Updated 2 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com☆1,163Apr 14, 2025Updated last year
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,222Mar 17, 2024Updated 2 years ago
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆18,233Sep 10, 2025Updated 8 months ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,976Mar 22, 2024Updated 2 years ago
- Richkware is a modern C++20 framework for building educational malware agents. It provides a comprehensive, secure, and modular architect…☆539Jan 4, 2026Updated 4 months ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,951Apr 1, 2026Updated last month
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,467Nov 3, 2018Updated 7 years ago
- UFONet - Denial of Service Toolkit☆2,463Aug 23, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A collection of source code for various botnets.☆565Oct 9, 2019Updated 6 years ago
- Defund the Police.☆13,769Jun 7, 2024Updated last year
- Malware sample library.☆597Nov 21, 2023Updated 2 years ago
- Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, ad…☆1,021Oct 3, 2024Updated last year
- Official Black Hat Arsenal Security Tools Repository☆4,281Aug 26, 2024Updated last year
- virus collection source code☆519Feb 8, 2023Updated 3 years ago
- A collection of hacking / penetration testing resources to make you better!☆17,011Mar 12, 2024Updated 2 years ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,537Apr 17, 2025Updated last year
- Most advanced XSS scanner.☆14,948Apr 26, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Build a basic Command & Control botnet in C☆398Oct 27, 2020Updated 5 years ago
- Exploitation Framework for Embedded Devices☆13,109May 5, 2026Updated 2 weeks ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,672Jun 20, 2024Updated last year
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,911Jan 24, 2024Updated 2 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,836Jan 19, 2020Updated 6 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,407Feb 10, 2021Updated 5 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,322May 7, 2026Updated last week