Malware and malicious applications database
-
Updated
Jun 12, 2024 - Java
Malware and malicious applications database
A private RAT with many features.
Unsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest
The africana-framework is a software designed for network & web hacking by automating as much stuff as possible to detect vulnerabilities on most common services and web technologies. It also has some wide range of penetration testing from internal network, Wi-Fi, system anonymity to web bug hunting. It's purely written for Good and not Evil.
🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Go programming language, all is made for educational purpoeses only.
Some Rust program I wrote while learning Malware Development
BOFs gift wrapped for Havoc
Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.
Defense Evasion Techniques Repository. This repository contains a collection of techniques designed to bypass Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) systems.
A simple trojan made for Windows in Python.
🦀 | RustRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Rust programming language
Cryptojacker that mines Monero with XMRig while pretending to install an unrelated application. Targets Windows 10 and 11 systems.
Welcome to the SecTools repository, a curated collection of penetration testing tools designed exclusively for educational purposes. This repository aims to provide a responsible and ethical environment for learning penetration testing techniques within legal boundaries.
RArAtikTdkA is a modern, c#-based malware with great undetectable techniques
A collection of offensive Go packages inspired by different Go repositories.
This is a simple keylogger malware for educational purposes
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.
A Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer, email sender, downloader, wireless password harvester credential harvester, keylogger, download&execute, ransomware, data harvestors, etc.
Add a description, image, and links to the malware-development topic page so that developers can more easily learn about it.
To associate your repository with the malware-development topic, visit your repo's landing page and select "manage topics."