MalwareRootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Cryptography | Shellcodes | Webshells | Keylogger | Botnets | Worms | Other Network Tools
Stars: ✭ 156 (+59.18%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+639.8%)
satan🔓 x86 Linux Kernel rootkit for Debian 9 (4.9.0-11-686-pae)
Stars: ✭ 31 (-68.37%)
FatherLD_PRELOAD rootkit
Stars: ✭ 59 (-39.8%)
Lime RatLimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)
Stars: ✭ 663 (+576.53%)
Xeexe TopantivirusevasionUndetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (+294.9%)
ThoronThoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-11.22%)
Malware SamplesA collection of malware samples caught by several honeypots i manage
Stars: ✭ 863 (+780.61%)
BlocklistsaggregatorA Python tool that downloads IP block lists from various sources and builds configurations for network equipments and firewalls.
Stars: ✭ 20 (-79.59%)
BlackwebDomains Blocklist for Squid-Cache
Stars: ✭ 189 (+92.86%)
ebpfkitebpfkit is a rootkit powered by eBPF
Stars: ✭ 472 (+381.63%)
superhideExample of hooking a linux systemcall
Stars: ✭ 48 (-51.02%)
CryptskyA simple, fully python ransomware PoC
Stars: ✭ 304 (+210.2%)
Hosts🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
Stars: ✭ 19,363 (+19658.16%)
HblockImprove your security and privacy by blocking ads, tracking and malware domains.
Stars: ✭ 724 (+638.78%)
EngineDroidefense: Advance Android Malware Analysis Framework
Stars: ✭ 386 (+293.88%)
WebshellWebshell && Backdoor Collection
Stars: ✭ 1,056 (+977.55%)
DeathransomA ransomware developed in python, with bypass technics, for educational purposes.
Stars: ✭ 126 (+28.57%)
Python RansomwarePython Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
Stars: ✭ 96 (-2.04%)
Www.rootkit.comwww.rootkit.com users section mirror, sql database dump, and a few other files/rootkits.
Stars: ✭ 117 (+19.39%)
SutekhAn example rootkit that gives a userland process root permissions
Stars: ✭ 62 (-36.73%)
nrf24nrf24l01 linux device driver
Stars: ✭ 20 (-79.59%)
ThefatratThefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Stars: ✭ 5,944 (+5965.31%)
rkduckLinux v4.x.x Rootkit
Stars: ✭ 83 (-15.31%)
execmonAdvanced process execution monitoring utility for linux (procmon like)
Stars: ✭ 77 (-21.43%)
HacktheworldAn Python Script For Generating Payloads that Bypasses All Antivirus so far .
Stars: ✭ 527 (+437.76%)
Mass RatBasic Multiplatform Remote Administration Tool - Xamarin
Stars: ✭ 127 (+29.59%)
CrypterCrypter - Python3 based builder and ransomware compiled to Windows executable using PyInstaller
Stars: ✭ 268 (+173.47%)
GonnacryA Linux Ransomware
Stars: ✭ 341 (+247.96%)
RansomwareCrypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.
Stars: ✭ 19 (-80.61%)
Ultimate.hosts.blacklistThe Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web sites and protect your devices and pc from being infected with Malware or Ransomware.
Stars: ✭ 606 (+518.37%)
RansomwareA POC Windows crypto-ransomware (Academic)
Stars: ✭ 504 (+414.29%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+1055.1%)
Php Antimalware ScannerAMWScan (PHP Antimalware Scanner) is a free tool to scan php files and analyze your project to find any malicious code inside it.
Stars: ✭ 181 (+84.69%)
The Big List Of Hacked Malware Web SitesThis repository contains a list of all web sites I come across that are either hacked with or purposefully hosting malware, ransomware, viruses or trojans.
Stars: ✭ 125 (+27.55%)
CypherPythonic ransomware proof of concept.
Stars: ✭ 178 (+81.63%)
BlockLet's make an annoyance free, better open internet, altogether!
Stars: ✭ 1,849 (+1786.73%)
rkorovald_preload userland rootkit
Stars: ✭ 34 (-65.31%)
ebpfkit-monitorebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits
Stars: ✭ 80 (-18.37%)
DdoorDDoor - cross platform backdoor using dns txt records
Stars: ✭ 168 (+71.43%)
JavaRansomwareSimple Ransomware Tool in Pure Java
Stars: ✭ 99 (+1.02%)
SpacecowWindows Rootkit written in Python
Stars: ✭ 81 (-17.35%)
VegileThis tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 478 (+387.76%)
proteccLinux kernel module to fight against police terror
Stars: ✭ 25 (-74.49%)
LinuxKernelLearnLearn Linux Kernel Step by Step, including the Modules, FS, Device Driver etc. --- Linux内核学习,包括Linux各模块,文件系统,设备驱动文件等。
Stars: ✭ 37 (-62.24%)
NetwormPython network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (+37.76%)
MsfManiaPython AV Evasion Tools
Stars: ✭ 388 (+295.92%)
Remot3dRemot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors
Stars: ✭ 263 (+168.37%)
VegileThis tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 601 (+513.27%)
Emp3r0rlinux post-exploitation framework made by linux user
Stars: ✭ 419 (+327.55%)
ToxicEye👽 Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (+211.22%)
S6 pcie microblazePCI Express DIY hacking toolkit for Xilinx SP605
Stars: ✭ 301 (+207.14%)
Ghost👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (+218.37%)