Statistics for topic malware
RepositoryStats tracks 633,542 Github repositories, of these 628 are tagged with the malware topic. The most common primary language for repositories using this topic is Python (172). Other languages include: C++ (71), C (66), Go (39), C# (37), Shell (28), Batchfile (13), Assembly (12), HTML (12), Java (11)
Stargazers over time for topic malware
Most starred repositories for topic malware (view more)
Trending repositories for topic malware (view more)
DNS-Blocklists: For a better internet - keep the internet clean!
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activity...
Setup guide for NextDNS, a DoH proxy with advanced capabilities
For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activity...
LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectable malleable implants compatible with Windows/Linux/Mac OSX, and...
For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.
MalwareDB: bookkeeping for malware, goodware, and unknown files with relationship discovery
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activity...
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
DNS-Blocklists: For a better internet - keep the internet clean!
For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.
🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activity...
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activity...
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.
LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectable malleable implants compatible with Windows/Linux/Mac OSX, and...
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activity...
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
DNS-Blocklists: For a better internet - keep the internet clean!
For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.
This repository contains complete resources and coding practices for malware development using Rust 🦀.
For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activity...
Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package. Windows ONLY.
Open source project for data preparation of LLM application builders
🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Go programming language, all is made for educatio...
For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.
DNS-Blocklists: For a better internet - keep the internet clean!
🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
This repository contains complete resources and coding practices for malware development using Rust 🦀.
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
ساخت پروفایل برای وصل انتن ایفون بدون رجیستر 🦹♀️ Configuration Profile Generator
LKM rootkit for modern kernels, with DNS C2 and a simple web interface
"AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS