Richkware is a modern C++20 framework for building educational malware agents. It provides a comprehensive, secure, and modular architecture for understanding malware mechanics and cybersecurity defense strategies.
☆540Jan 4, 2026Updated 4 months ago
Alternatives and similar repositories for Richkware
Users that are interested in Richkware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Service for management of hosts where is present a malware developed using Richkware framework.☆18Feb 5, 2026Updated 3 months ago
- Client of Richkware-Manager-Server, that obtains list of all hosts and is able to send commands to do at each of them.☆13Dec 28, 2025Updated 4 months ago
- A Stealthy Trojan Spyware☆1,191Oct 20, 2025Updated 6 months ago
- A Terrific Keystroke Recorder☆518Oct 20, 2025Updated 6 months ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆176Aug 8, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- malware source codes☆579Dec 16, 2022Updated 3 years ago
- Software Distribution Service☆12Jul 2, 2015Updated 10 years ago
- A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.☆622Dec 28, 2021Updated 4 years ago
- Keylogger Code In C++ Will Work On Window 7, 8, 8.1, And 10☆81Jul 12, 2018Updated 7 years ago
- InfectPE - Inject custom code into PE file [This project is not maintained anymore]☆325Apr 26, 2017Updated 9 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,463Nov 3, 2018Updated 7 years ago
- Second Version of The GoBot Botnet, But more advanced.☆757Sep 24, 2021Updated 4 years ago
- Project aimed at creating a malware able to evolve and adapt to the various host machines through metamorphic modifications, spontaneous …☆44Sep 29, 2017Updated 8 years ago
- Windows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe".☆400Mar 11, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware☆1,045Jun 3, 2021Updated 4 years ago
- HTTP Botnet☆923Oct 27, 2020Updated 5 years ago
- ☆12Jul 17, 2017Updated 8 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆79Aug 12, 2015Updated 10 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about…☆1,557Dec 8, 2020Updated 5 years ago
- Lilith - Foundational reverse engineering resource for cybersecurity entrepreneurs in C++☆752Apr 1, 2020Updated 6 years ago
- XOR encryption, malware crypter☆97Jan 6, 2014Updated 12 years ago
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆741Mar 17, 2019Updated 7 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆325Jun 25, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆383Apr 17, 2017Updated 9 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago
- Polymorphic Stub Creator☆34Jun 11, 2017Updated 8 years ago
- Class implementation of PowerLoader injection technique☆32Dec 23, 2016Updated 9 years ago
- virus collection source code☆515Feb 8, 2023Updated 3 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆508Oct 8, 2017Updated 8 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆94May 15, 2021Updated 4 years ago
- Reflective PE loader for DLL injection☆187Oct 12, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆142May 30, 2019Updated 6 years ago
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆230Mar 22, 2023Updated 3 years ago
- ☆34Sep 3, 2018Updated 7 years ago
- LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)☆1,125Jun 24, 2019Updated 6 years ago
- Alina Spark - Point of Sales Trojan☆50Feb 25, 2015Updated 11 years ago
- Demos of various injection techniques found in malware☆791Feb 15, 2022Updated 4 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 3 years ago