M-BotnetA C2 project that controls a self-propagating MS17-010 worm.
Stars: ✭ 39 (-41.79%)
CerberusA complete Grabber, sending data to a TCP server that you have to host and stocking all in a database.
Stars: ✭ 32 (-52.24%)
CypherPythonic ransomware proof of concept.
Stars: ✭ 178 (+165.67%)
ToxicEye👽 Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (+355.22%)
ConTroll Remote Access TrojanCreated a VERY SIMPLE remote access Trojan that will establish administrative control over any windows machine it compromises.
Stars: ✭ 69 (+2.99%)
Php Antimalware ScannerAMWScan (PHP Antimalware Scanner) is a free tool to scan php files and analyze your project to find any malicious code inside it.
Stars: ✭ 181 (+170.15%)
Telegram RatWindows Remote Administration Tool via Telegram. Written in Python
Stars: ✭ 201 (+200%)
ViriiCollection of ancient computer virus source codes
Stars: ✭ 378 (+464.18%)
RatelRAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (+80.6%)
Fe2O3Simple prepender virus written in Rust
Stars: ✭ 84 (+25.37%)
MalwareDatabaseMalware samples for analysis, researchers, anti-virus and system protection testing.(1300+ Malware-samples!)
Stars: ✭ 21 (-68.66%)
SerpentineC++/Win32/Boost Windows RAT (Remote Administration Tool) with a multiplatform Java/Spring RESTful C2 server and Go, C++/Qt5 frontends
Stars: ✭ 216 (+222.39%)
RichkwareFramework for building Windows malware, written in C++
Stars: ✭ 315 (+370.15%)
ZeusNOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about your lame hacking attempts.
Stars: ✭ 1,043 (+1456.72%)
Gobot2Second Version of The GoBot Botnet, But more advanced.
Stars: ✭ 431 (+543.28%)
carrierwave-attachmentscannerAdds the ability to send CarrierWave uploads to Attachment Scanner for virus and malware prevention.
Stars: ✭ 14 (-79.1%)
CrypterCrypter - Python3 based builder and ransomware compiled to Windows executable using PyInstaller
Stars: ✭ 268 (+300%)
Adamantium Thief🔑 Decrypt chromium based browsers passwords, cookies, credit cards, history, bookmarks, autofill. Version > 80 is supported.
Stars: ✭ 283 (+322.39%)
Inferno🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (+56.72%)
Open MyrtusRCEed version of computer malware / rootkit MyRTUs / Stuxnet.
Stars: ✭ 208 (+210.45%)
BotnetsThis is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY
Stars: ✭ 2,523 (+3665.67%)
MalwareRootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Cryptography | Shellcodes | Webshells | Keylogger | Botnets | Worms | Other Network Tools
Stars: ✭ 156 (+132.84%)
Anti-DebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 297 (+343.28%)
RagnarokVirus Package ( For Educational Purposes )
Stars: ✭ 23 (-65.67%)
AntidebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 161 (+140.3%)
KicomavKicomAV is an open source (GPL v2) antivirus engine designed for detecting malware and disinfecting it.
Stars: ✭ 227 (+238.81%)
JavaRansomwareSimple Ransomware Tool in Pure Java
Stars: ✭ 99 (+47.76%)
maskedkitty🙀 Icon Changer, File Pumper & Extension Spoofer - Quickly Modify Executable Files
Stars: ✭ 39 (-41.79%)
cerberus researchResearch tools for analysing Cerberus banking trojan.
Stars: ✭ 110 (+64.18%)
showstopperShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solutions that clash with standard anti-debug methods.
Stars: ✭ 132 (+97.01%)
polioResearch on polio / protein folding.
Stars: ✭ 13 (-80.6%)
macOS-Security-UpdatesNotifies the user when macOS Security components like Gatekeeper and XProtect have been updated
Stars: ✭ 53 (-20.9%)
binlexA Binary Genetic Traits Lexer Framework
Stars: ✭ 303 (+352.24%)
dga-collectionA collection of known Domain Generation Algorithms
Stars: ✭ 61 (-8.96%)
QuiescisQuescis is a powerful Remote Access Trojan for windows 💻 on C++
Stars: ✭ 56 (-16.42%)
JustEvadeBroJustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.
Stars: ✭ 63 (-5.97%)
pihole-blocklistsDomain blocklists for Pi-Hole that are free and open for use by everyone.
Stars: ✭ 13 (-80.6%)
Python-KeyloggerPython Tutorial - || Advanced Keylogger || Code Walk-through || Hacking/Info-Sec ||
Stars: ✭ 55 (-17.91%)
virionThe Global Virome in One Network
Stars: ✭ 27 (-59.7%)
ThreatPursuit-VMThreat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
Stars: ✭ 1,033 (+1441.79%)
S1EMThis project is a SIEM with SIRP and Threat Intel, all in one.
Stars: ✭ 270 (+302.99%)
malware-persistenceCollection of malware persistence and hunting information. Be a persistent persistence hunter!
Stars: ✭ 109 (+62.69%)
Reverse-EngineeringA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+10697.01%)
matrixmirror of https://mypdns.org/my-privacy-dns/matrix as it is obviously no longer safe to do Girhub nor have we no longer any trust in them. See https://mypdns.org/my-privacy-dns/porn-records/-/issues/1347
Stars: ✭ 32 (-52.24%)
bluepillBluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)
Stars: ✭ 94 (+40.3%)
Defeat-Defender-V1.2Powerful batch script to dismantle complete windows defender protection and even bypass tamper protection ..Disable Windows-Defender Permanently....Hack windows. POC
Stars: ✭ 885 (+1220.9%)
DLL-INJECTORI created a dll injector I am going to Open source its Code. But remember one thing that is any one can use it only for Educational purpose .I again say do not use it to damage anyone's Computer.But one thing if you are using it for some good purpose like to help someone who really need help then I permit you to use it.
Stars: ✭ 14 (-79.1%)
DGA-DetectionDGA Domain Detection using Bigram Frequency Analysis
Stars: ✭ 47 (-29.85%)
gocaveFinding code caves in ELF files with GoLang
Stars: ✭ 22 (-67.16%)
hacking-resourcesHacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security professionals.
Stars: ✭ 1,386 (+1968.66%)
ArminC-uBlock-Settings⚙️ ArminC's settings for uBlock₀ - remove most of the ads, pop-ups and trackers.
Stars: ✭ 24 (-64.18%)