Collection of malware source code for a variety of platforms in an array of different programming languages.
☆17,997Sep 10, 2025Updated 7 months ago
Alternatives and similar repositories for MalwareSourceCode
Users that are interested in MalwareSourceCode are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Research code & papers from members of vx-underground.☆1,375Dec 7, 2021Updated 4 years ago
- Collection of various malicious functionality to aid in malware development☆1,877Feb 28, 2024Updated 2 years ago
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆12,962Apr 1, 2026Updated 3 weeks ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆77,264Apr 22, 2026Updated last week
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆13,507Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Defund the Police.☆13,686Jun 7, 2024Updated last year
- 🕵️♂️ Offensive Google framework.☆18,763Apr 10, 2026Updated 2 weeks ago
- The Havoc Framework☆8,311Dec 18, 2025Updated 4 months ago
- Adversary Emulation Framework☆11,081Apr 22, 2026Updated last week
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,593Mar 20, 2026Updated last month
- Reverse Engineer's Toolkit☆5,189May 1, 2025Updated 11 months ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com☆1,163Apr 14, 2025Updated last year
- 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.☆53,332Updated this week
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,973Apr 22, 2026Updated last week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Organized list of my malware development resources☆1,718Apr 1, 2026Updated 3 weeks ago
- Ghidra is a software reverse engineering (SRE) framework☆67,729Updated this week
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,933Apr 1, 2026Updated 3 weeks ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,729Apr 22, 2026Updated last week
- My experiments in weaponizing Nim (https://nim-lang.org/)☆3,057May 13, 2024Updated last year
- Materials for Windows Malware Analysis training (volume 1)☆2,035Jul 1, 2024Updated last year
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,522Updated this week
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,552Jul 8, 2025Updated 9 months ago
- A little tool to play with Windows security☆21,464Apr 17, 2026Updated last week
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Red Teaming Tactics and Techniques☆4,575Aug 22, 2024Updated last year
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆28,094Updated this week
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,760Apr 16, 2026Updated last week
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,635Apr 18, 2026Updated last week
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,488Mar 16, 2026Updated last month
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,879Aug 18, 2023Updated 2 years ago
- Malware samples, analysis exercises and other interesting resources.☆1,630Jan 13, 2024Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15,003Oct 6, 2025Updated 6 months ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,675Jul 18, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,596Jan 18, 2026Updated 3 months ago
- A workshop about Malware Development☆1,778Jun 2, 2023Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆15,655Updated this week
- Course materials for Malware Analysis by RPISEC☆4,017Aug 26, 2022Updated 3 years ago
- articles☆13,791Apr 3, 2023Updated 3 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,272Sep 29, 2025Updated 7 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,236Mar 28, 2025Updated last year