GitHub topics: malware-builder
izmirlikezzap/RedTiger-Tools
RedTiger-Tools is a free multi-tool with many features in the areas of Cybersecurity, Pentesting, OSINT, Network Scanning, Discord and Ethical Hacking. (For educational purposes only)
Language: Python - Size: 108 MB - Last synced at: about 13 hours ago - Pushed at: about 13 hours ago - Stars: 42 - Forks: 0
abhijithsubin123/RedTiger-Tools
RedTiger-Tools is a free multi-tool with many features in the areas of Cybersecurity, Pentesting, OSINT, Network Scanning, Discord and Ethical Hacking. (For educational purposes only)
Language: Python - Size: 108 MB - Last synced at: 5 days ago - Pushed at: 5 days ago - Stars: 46 - Forks: 0
Bakwioma/Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native
Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.
Language: Visual Basic .NET - Size: 13 MB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 0 - Forks: 0
Cahwoam/Batch-Downloader-Crypter-FUD-UAC-Bypass
Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.
Language: Visual Basic .NET - Size: 24.7 MB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 0 - Forks: 0
Cahwoam/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 0 - Forks: 0
Bakwioma/Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable
Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.
Language: Visual Basic .NET - Size: 14.4 MB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 0 - Forks: 0
Bakwioma/Exe-To-Base64-ShellCode-Convert
Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.
Language: Visual Basic .NET - Size: 60.5 KB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 0 - Forks: 0
Bakwioma/Exe-To-Batch-Convert
RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.
Language: Visual Basic .NET - Size: 13 MB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 0 - Forks: 0
Chimrisowm/Exe-To-Batch-Convert
RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.
Language: Visual Basic .NET - Size: 13 MB - Last synced at: 11 days ago - Pushed at: 11 days ago - Stars: 0 - Forks: 0
Chimrisowm/Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native
Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.
Language: Visual Basic .NET - Size: 13 MB - Last synced at: 11 days ago - Pushed at: 11 days ago - Stars: 0 - Forks: 0
Chimrisowm/Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable
Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.
Language: Visual Basic .NET - Size: 16 MB - Last synced at: 11 days ago - Pushed at: 11 days ago - Stars: 0 - Forks: 0
Chimrisowm/Exe-To-Base64-ShellCode-Convert
Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.
Language: Visual Basic .NET - Size: 61.5 KB - Last synced at: 11 days ago - Pushed at: 11 days ago - Stars: 0 - Forks: 0
Waltomw/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 11 days ago - Pushed at: 11 days ago - Stars: 0 - Forks: 0
Waltomw/Batch-Downloader-Crypter-FUD-UAC-Bypass
Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.
Language: Visual Basic .NET - Size: 24.7 MB - Last synced at: 11 days ago - Pushed at: 11 days ago - Stars: 0 - Forks: 0
Tarekmets/Exe-To-Base64-ShellCode-Convert
Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.
Language: Visual Basic .NET - Size: 365 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0
Tarekmets/Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native
Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.
Language: Visual Basic .NET - Size: 12.7 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0
Tarekmets/Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable
Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.
Language: Visual Basic .NET - Size: 14.8 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0
Vadelarez/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Language: Visual Basic .NET - Size: 14 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 1
Vadelarez/Batch-Downloader-Crypter-FUD-UAC-Bypass
Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.
Language: Visual Basic .NET - Size: 24.3 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0
Print3M/ByteCaster
Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supported)! ☢️
Language: Go - Size: 10.3 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 2 - Forks: 1
SeraphyneProjects/BlackRoot
BlackRoot is an advanced Android toolkit focused on malware simulation — developed as part of SeOSP - 档案来源.
Size: 552 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 4 - Forks: 0
amine217c/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Language: Visual Basic .NET - Size: 13.5 MB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0
Taowmw/Batch-Downloader-Crypter-FUD-UAC-Bypass
Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.
Language: Visual Basic .NET - Size: 24.4 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 1
Taowmw/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Language: Visual Basic .NET - Size: 14.1 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0
loxy0dev/RedTiger-Tools
RedTiger-Tools is a free multi-tool with many features in the areas of Cybersecurity, Pentesting, OSINT, Network Scanning, Discord and Ethical Hacking. (For educational purposes only)
Language: Python - Size: 177 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 1,252 - Forks: 246
sathi2/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Language: Visual Basic .NET - Size: 13.5 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 4 - Forks: 2
stegman-ux/Butcher-Tools
Language: Python - Size: 434 KB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 10 - Forks: 0
whlke1/Ether-multi-tool
Ether is a multi-tool with many features in the areas of Cybersecurity, Pentesting, OSINT, Network Scanning, Discord and Hacking.
Language: Python - Size: 17.6 KB - Last synced at: 4 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0
lifegood-2000/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Size: 1.66 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 0 - Forks: 0
Taanozm/Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native
Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.
Language: Visual Basic .NET - Size: 12.4 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 0 - Forks: 0
Taanozm/Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable
Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.
Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 0 - Forks: 0
Taanozm/Exe-To-Batch-Convert
RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.
Language: Visual Basic .NET - Size: 12.4 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 0 - Forks: 1
kheidrimessaoud/Butcher-Tools
Discover Butcher-Tools, a versatile toolkit with 35+ features for OSINT, Discord automation, and more. Stay tuned for the launch! 🌟👨💻
Size: 3.91 KB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 0 - Forks: 0
johnlass09/Batch-Downloader-Crypter-FUD-UAC-Bypass
Batch-Downloader-Crypter-FUD-UAC-Bypass offers tools for script obfuscation and encryption, enhancing security against reverse engineering. 🛡️🔒
Language: Visual Basic .NET - Size: 23.8 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 0 - Forks: 0
Reazmx/Exe-To-Batch-Convert
RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.
Language: Visual Basic .NET - Size: 12.7 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0
Reazmx/Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable
Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.
Language: Visual Basic .NET - Size: 14.8 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0
Reazmx/Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native
Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.
Language: Visual Basic .NET - Size: 12.6 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 1 - Forks: 0
Reazmx/Exe-To-Base64-ShellCode-Convert
Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.
Language: Visual Basic .NET - Size: 388 KB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 1 - Forks: 0
Theinxm/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Language: Visual Basic .NET - Size: 13.9 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0
Theinxm/Batch-Downloader-Crypter-FUD-UAC-Bypass
Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.
Language: Visual Basic .NET - Size: 24.1 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0
Feanrodash/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Language: Visual Basic .NET - Size: 13.9 MB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0
Feanrodash/Batch-Downloader-Crypter-FUD-UAC-Bypass
Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.
Language: Visual Basic .NET - Size: 24.2 MB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0
ZeroTrace-0/Octalyn-Forensic-Toolkit
Advanced C++ toolkit for forensic data extraction and session analysis. Supports browsers, messaging apps, gaming platforms, VPNs, and wallet environments. Ideal for red team simulations and credential management research, and real-time logging via Telegram
Language: Pascal - Size: 0 Bytes - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0
MaszkKrty/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0
MaszkKrty/Batch-Downloader-Crypter-FUD-UAC-Bypass
Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.
Language: Visual Basic .NET - Size: 24.7 MB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0
Ohiaras/Exe-To-Batch-Convert
RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.
Language: Visual Basic .NET - Size: 13 MB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0
Ohiaras/Exe-To-Base64-ShellCode-Convert
Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.
Language: Visual Basic .NET - Size: 51.8 KB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0
Ohiaras/Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native
Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.
Language: Visual Basic .NET - Size: 0 Bytes - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0
Ohiaras/Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable
Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.
Language: Visual Basic .NET - Size: 0 Bytes - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 1 - Forks: 0
Huyqia/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0
Huyqia/Batch-Downloader-Crypter-FUD-UAC-Bypass
Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.
Language: Visual Basic .NET - Size: 24.7 MB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0
Orshity/Batch-Downloader-Crypter-FUD-UAC-Bypass
Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.
Language: Visual Basic .NET - Size: 24.1 MB - Last synced at: 7 months ago - Pushed at: 7 months ago - Stars: 0 - Forks: 0
Orshity/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Language: Visual Basic .NET - Size: 13.9 MB - Last synced at: 7 months ago - Pushed at: 7 months ago - Stars: 0 - Forks: 0
Kartiean/Exe-To-Batch-Convert
RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.
Language: Visual Basic .NET - Size: 12.4 MB - Last synced at: 7 months ago - Pushed at: 7 months ago - Stars: 0 - Forks: 0
Kartiean/Exe-To-Base64-ShellCode-Convert
Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.
Language: Visual Basic .NET - Size: 134 KB - Last synced at: 7 months ago - Pushed at: 7 months ago - Stars: 0 - Forks: 0
Kartiean/Exe-UACBypass-Downloader-Crypter-Fud-Defender-Malware-Executable
Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.
Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 7 months ago - Pushed at: 7 months ago - Stars: 1 - Forks: 0
anonymousjer023/Exe-UACBypass-Downloader-Crypter-Fud-Defender-Malware-Executable
Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.
Language: Visual Basic .NET - Size: 13.9 MB - Last synced at: 7 months ago - Pushed at: 7 months ago - Stars: 0 - Forks: 0
Raisots/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.
Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 7 months ago - Pushed at: 7 months ago - Stars: 0 - Forks: 0
Raisots/Batch-Downloader-Crypter-FUD-UAC-Bypass
Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.
Language: Visual Basic .NET - Size: 24.7 MB - Last synced at: 7 months ago - Pushed at: 7 months ago - Stars: 0 - Forks: 0
DefinetlyNotAI/MalwareBuilder
My second largest project yet, A very simple, but intuitive Malware builder!!!
Language: Python - Size: 161 KB - Last synced at: 6 months ago - Pushed at: 7 months ago - Stars: 6 - Forks: 0
K3rnel-Dev/RunPE-Builder
Demo work of injection into someone else's address space process
Language: C# - Size: 1.5 MB - Last synced at: 8 months ago - Pushed at: 11 months ago - Stars: 0 - Forks: 1
creedster1111z/H3llware
A multitool used to d0x and pull info and log . For educational purposes only.... I am not responsible for the trouble you cause.
Size: 2.75 MB - Last synced at: 10 months ago - Pushed at: 10 months ago - Stars: 2 - Forks: 0
LotusTrojan/Virus-Maker-VB
From BlackHost
Language: Visual Basic .NET - Size: 863 KB - Last synced at: 11 months ago - Pushed at: 11 months ago - Stars: 7 - Forks: 1
Samuraibaracuda/Kadick-Doxxing-Tool
KADICK-Tools is a free multi-tool with many features in the areas of cybersecurity, pentesting and hacking.
Size: 2.09 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0
Data3rr/Res0luti0n
RES0LUTI0N is a malware builder undetected by Windows Defender with an anti-VM coded in python and C#. It uses a triple layer randomized obfuscation system, a malware partitioning system and a recompilation system at the same time.
Language: Python - Size: 279 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 33 - Forks: 5
ayuly0/Luxy
Luxy is Stealer (base on Umbral Stealer) + Ransomware + Clipper (Still in Development)
Language: C# - Size: 343 KB - Last synced at: almost 2 years ago - Pushed at: over 2 years ago - Stars: 1 - Forks: 0
Cryptodev818/Exchange-Crypto-Clipboard
Create crypto address cliboard exchange virus yourself.
Size: 25.5 MB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 5 - Forks: 0
btc-stealer/crypto-clipper
The best Cryptocurrency Clipper | Bitcoin Clipper and Stealer Malware Builder
Size: 24.3 MB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 0 - Forks: 1
bestjectr/Slient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cve
One of the most complex tasks for the cyber security expert is to ensure their malicious code goes detected by antivirus and achieves its goal.
Language: C++ - Size: 632 KB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 0 - Forks: 0
bestjectr/Jpg-Png-Exploit-Downloader-Fud-Cryter-Malware-Builder-Cve-2023
Vulnerability Disclosure Timeline Closer inspection of the Exploit JPG content reveals the malicious link as well as the URL Download and Execute of the tool used to generate the Exploit JPG from Python encrypted code content which we also implement in couple of our builders.
Language: C++ - Size: 649 KB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 0 - Forks: 0
Pyran1/RAT-Collection
Remote Access Trojan collection.(260+ RAT-Builders!)
Size: 1000 MB - Last synced at: over 2 years ago - Pushed at: over 3 years ago - Stars: 86 - Forks: 16
cookie0o/py-crypter-builder 📦
A Malware Virus builder made in 100% Python and auto compile.
Language: Python - Size: 81.1 KB - Last synced at: over 2 years ago - Pushed at: almost 3 years ago - Stars: 0 - Forks: 0