Richkware is a modern C++20 framework for building educational malware agents. It provides a comprehensive, secure, and modular architecture for understanding malware mechanics and cybersecurity defense strategies.
☆539Jan 4, 2026Updated 3 months ago
Alternatives and similar repositories for Richkware
Users that are interested in Richkware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Service for management of hosts where is present a malware developed using Richkware framework.☆18Feb 5, 2026Updated 2 months ago
- Client of Richkware-Manager-Server, that obtains list of all hosts and is able to send commands to do at each of them.☆13Dec 28, 2025Updated 3 months ago
- A Stealthy Trojan Spyware☆1,176Oct 20, 2025Updated 5 months ago
- A Terrific Keystroke Recorder☆513Oct 20, 2025Updated 5 months ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆177Aug 8, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- malware source codes☆575Dec 16, 2022Updated 3 years ago
- Software Distribution Service☆12Jul 2, 2015Updated 10 years ago
- A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.☆621Dec 28, 2021Updated 4 years ago
- Keylogger Code In C++ Will Work On Window 7, 8, 8.1, And 10☆81Jul 12, 2018Updated 7 years ago
- InfectPE - Inject custom code into PE file [This project is not maintained anymore]☆325Apr 26, 2017Updated 8 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,458Nov 3, 2018Updated 7 years ago
- Second Version of The GoBot Botnet, But more advanced.☆758Sep 24, 2021Updated 4 years ago
- Project aimed at creating a malware able to evolve and adapt to the various host machines through metamorphic modifications, spontaneous …☆44Sep 29, 2017Updated 8 years ago
- Windows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe".☆399Mar 11, 2020Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware☆1,042Jun 3, 2021Updated 4 years ago
- HTTP Botnet☆923Oct 27, 2020Updated 5 years ago
- ☆12Jul 17, 2017Updated 8 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆79Aug 12, 2015Updated 10 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about…☆1,553Dec 8, 2020Updated 5 years ago
- Lilith - Foundational reverse engineering resource for cybersecurity entrepreneurs in C++☆752Apr 1, 2020Updated 6 years ago
- XOR encryption, malware crypter☆97Jan 6, 2014Updated 12 years ago
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆741Mar 17, 2019Updated 7 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆325Jun 25, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆382Apr 17, 2017Updated 9 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago
- Class implementation of PowerLoader injection technique☆32Dec 23, 2016Updated 9 years ago
- Polymorphic Stub Creator☆34Jun 11, 2017Updated 8 years ago
- virus collection source code☆510Feb 8, 2023Updated 3 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆507Oct 8, 2017Updated 8 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆94May 15, 2021Updated 4 years ago
- Reflective PE loader for DLL injection☆187Oct 12, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆143May 30, 2019Updated 6 years ago
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆230Mar 22, 2023Updated 3 years ago
- ☆34Sep 3, 2018Updated 7 years ago
- LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)☆1,127Jun 24, 2019Updated 6 years ago
- Alina Spark - Point of Sales Trojan☆50Feb 25, 2015Updated 11 years ago
- Demos of various injection techniques found in malware☆792Feb 15, 2022Updated 4 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 3 years ago