Malware Samples. Uploaded to GitHub for those want to analyse the code.
☆34Nov 12, 2016Updated 9 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below
Sorting:
- Remote Access Trojan(RAT), Miner, DDoS☆35Nov 14, 2016Updated 9 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Dec 3, 2015Updated 10 years ago
- Malicious Software SRC Extract☆32Jan 2, 2023Updated 3 years ago
- Archive of leaked Equation Group materials☆17Aug 17, 2016Updated 9 years ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 9 years ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆16Oct 31, 2016Updated 9 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- SQLi Tool/SQL Injection/Hijacker☆46Dec 10, 2016Updated 9 years ago
- Exploitkit☆189Dec 10, 2016Updated 9 years ago
- WebShell Dump☆178Dec 10, 2016Updated 9 years ago
- Framework for Making Environmental Keyed Payloads☆14Nov 1, 2016Updated 9 years ago
- Remote Administration Tool for Windows☆41Mar 30, 2016Updated 9 years ago
- Dangerous Malwares☆216Dec 10, 2016Updated 9 years ago
- malwares src dump☆41Mar 3, 2017Updated 9 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆15Mar 19, 2016Updated 10 years ago
- ☆17Nov 9, 2023Updated 2 years ago
- Unity SDK for Aptabase: Open Source, Privacy-First and Simple Analytics for Mobile, Desktop and Web Apps☆20Feb 22, 2026Updated last month
- Windows Remote Administration Tool via Telegram☆38Apr 20, 2017Updated 8 years ago
- Zero-Day Code Injection and Persistence Technique☆31Mar 23, 2017Updated 8 years ago
- Windows Crypter☆425Dec 28, 2016Updated 9 years ago
- Windows Remote-Access-Trojan☆719Dec 28, 2016Updated 9 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- Search Nmap and Metasploit scanning scripts.☆54Sep 18, 2017Updated 8 years ago
- Windows Stealer☆190Dec 10, 2016Updated 9 years ago
- Botnet☆943Feb 8, 2023Updated 3 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆16Aug 4, 2023Updated 2 years ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Oct 26, 2017Updated 8 years ago
- slide☆13Oct 26, 2017Updated 8 years ago
- Simple decrypter for Java AdWind, jRAT, jBifrost trojan☆17Jan 17, 2017Updated 9 years ago
- Various CTF challenge solutions☆12Apr 20, 2021Updated 4 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- A simple flashable zip to switch between LineageOS and Sailfish OS boots☆11Dec 7, 2020Updated 5 years ago
- zsh plugin for metasploit framework☆14Nov 1, 2017Updated 8 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 11 years ago
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- ☆19Apr 30, 2018Updated 7 years ago
- ☆29Jul 7, 2023Updated 2 years ago
- Tattoo shop for FXServer built on top of ESX☆10Jun 5, 2020Updated 5 years ago
- A Qt and C++ GUI for radare2 reverse engineering framework☆12Oct 13, 2017Updated 8 years ago