malwares / DangerousZone
Dangerous Malwares
☆201Updated 8 years ago
Alternatives and similar repositories for DangerousZone:
Users that are interested in DangerousZone are comparing it to the libraries listed below
- Exploitkit☆184Updated 8 years ago
- Windows Crypter☆414Updated 8 years ago
- Athena Botnet Source Code☆147Updated 9 years ago
- Windows Remote-Access-Trojan☆644Updated 8 years ago
- Pythonic ransomware proof of concept.☆217Updated 4 years ago
- WebShell Dump☆171Updated 8 years ago
- An open source RansomWare☆86Updated 5 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆141Updated 5 years ago
- Python Remote Access Trojan☆138Updated 4 years ago
- Botnet☆866Updated 2 years ago
- Malware exploits☆540Updated 5 years ago
- Various codes related to Ransomware Developement☆122Updated 7 years ago
- Bug7sec Team - ransomware open source (web)☆131Updated 7 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆372Updated 8 years ago
- A Phishing Dropper designed to Pentest.☆270Updated 7 years ago
- Qbot Botnet. Telnet botnet, most powerfull and strong botnet. requirements: 2 linux server.☆165Updated 8 years ago
- RAT Museum☆105Updated 2 years ago
- CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system a…☆139Updated last year
- This tool creates almost undetectabe trojan virus to exploit windows machine.☆135Updated 7 years ago
- Collection of Remote Administration Tool samples☆251Updated 9 years ago
- Multiplatform payload dropper☆264Updated 3 years ago
- A ctypes powered python keylogger.☆104Updated 5 years ago
- transform your payload.exe into one fake word doc (.ppt)☆464Updated 5 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆184Updated 6 years ago
- Python based Remote Administration Tool(RAT)☆93Updated 4 years ago
- Botnet command & control monitor☆190Updated 2 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆71Updated 5 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆25Updated 8 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225Updated 3 years ago
- Better Remote Access Trojan☆49Updated 8 years ago