threatland / TL-BOTS
A collection of source code for various botnets.
☆552Updated 5 years ago
Alternatives and similar repositories for TL-BOTS:
Users that are interested in TL-BOTS are comparing it to the libraries listed below
- A collection of source code for various RATs, Stealers, and other Trojans.☆426Updated 5 years ago
- Botnet☆857Updated last year
- Malware exploits☆539Updated 5 years ago
- HTTP Botnet☆889Updated 4 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆546Updated 2 months ago
- Malware sample library.☆562Updated last year
- A simple, fully python ransomware PoC☆370Updated 4 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948Updated 5 years ago
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆892Updated 10 months ago
- Framework for building Windows malware, written in C++☆507Updated 3 years ago
- https://twitter.com/itsreallynick/status/1120410950430089224☆393Updated 5 years ago
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.☆890Updated 4 years ago
- malware source codes☆550Updated 2 years ago
- mXtract - Memory Extractor & Analyzer☆584Updated 3 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,040Updated 3 years ago
- Python Decoders for Common Remote Access Trojans☆1,077Updated 6 months ago
- Python telnet honeypot for catching botnet binaries☆305Updated 11 months ago
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,329Updated 4 years ago
- A collection of fraud related tools for research.☆147Updated 5 years ago
- Reverse Engineering Tutorials☆516Updated 6 years ago
- fireELF - Fileless Linux Malware Framework☆659Updated 5 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆544Updated 3 years ago
- virus collection source code☆432Updated last year
- Dangerous Malwares☆201Updated 8 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,248Updated 2 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆639Updated 5 years ago
- transform your payload.exe into one fake word doc (.ppt)☆462Updated 5 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆143Updated 5 years ago
- Modern tactical exploitation toolkit.☆841Updated 6 months ago
- IP obfuscator made to make a malicious ip a bit cuter☆542Updated 3 months ago