An open API service providing repository metadata for many open source software ecosystems.

GitHub topics: malware-builder

izmirlikezzap/RedTiger-Tools

RedTiger-Tools is a free multi-tool with many features in the areas of Cybersecurity, Pentesting, OSINT, Network Scanning, Discord and Ethical Hacking. (For educational purposes only)

Language: Python - Size: 108 MB - Last synced at: about 13 hours ago - Pushed at: about 13 hours ago - Stars: 42 - Forks: 0

abhijithsubin123/RedTiger-Tools

RedTiger-Tools is a free multi-tool with many features in the areas of Cybersecurity, Pentesting, OSINT, Network Scanning, Discord and Ethical Hacking. (For educational purposes only)

Language: Python - Size: 108 MB - Last synced at: 5 days ago - Pushed at: 5 days ago - Stars: 46 - Forks: 0

Bakwioma/Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native

Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.

Language: Visual Basic .NET - Size: 13 MB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 0 - Forks: 0

Cahwoam/Batch-Downloader-Crypter-FUD-UAC-Bypass

Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.

Language: Visual Basic .NET - Size: 24.7 MB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 0 - Forks: 0

Cahwoam/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass

Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.

Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 0 - Forks: 0

Bakwioma/Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable

Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.

Language: Visual Basic .NET - Size: 14.4 MB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 0 - Forks: 0

Bakwioma/Exe-To-Base64-ShellCode-Convert

Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.

Language: Visual Basic .NET - Size: 60.5 KB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 0 - Forks: 0

Bakwioma/Exe-To-Batch-Convert

RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.

Language: Visual Basic .NET - Size: 13 MB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 0 - Forks: 0

Chimrisowm/Exe-To-Batch-Convert

RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.

Language: Visual Basic .NET - Size: 13 MB - Last synced at: 11 days ago - Pushed at: 11 days ago - Stars: 0 - Forks: 0

Chimrisowm/Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native

Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.

Language: Visual Basic .NET - Size: 13 MB - Last synced at: 11 days ago - Pushed at: 11 days ago - Stars: 0 - Forks: 0

Chimrisowm/Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable

Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.

Language: Visual Basic .NET - Size: 16 MB - Last synced at: 11 days ago - Pushed at: 11 days ago - Stars: 0 - Forks: 0

Chimrisowm/Exe-To-Base64-ShellCode-Convert

Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.

Language: Visual Basic .NET - Size: 61.5 KB - Last synced at: 11 days ago - Pushed at: 11 days ago - Stars: 0 - Forks: 0

Waltomw/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass

Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.

Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 11 days ago - Pushed at: 11 days ago - Stars: 0 - Forks: 0

Waltomw/Batch-Downloader-Crypter-FUD-UAC-Bypass

Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.

Language: Visual Basic .NET - Size: 24.7 MB - Last synced at: 11 days ago - Pushed at: 11 days ago - Stars: 0 - Forks: 0

Tarekmets/Exe-To-Base64-ShellCode-Convert

Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.

Language: Visual Basic .NET - Size: 365 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Tarekmets/Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native

Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.

Language: Visual Basic .NET - Size: 12.7 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Tarekmets/Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable

Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.

Language: Visual Basic .NET - Size: 14.8 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Vadelarez/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass

Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.

Language: Visual Basic .NET - Size: 14 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 1

Vadelarez/Batch-Downloader-Crypter-FUD-UAC-Bypass

Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.

Language: Visual Basic .NET - Size: 24.3 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Print3M/ByteCaster

Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supported)! ☢️

Language: Go - Size: 10.3 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 2 - Forks: 1

SeraphyneProjects/BlackRoot

BlackRoot is an advanced Android toolkit focused on malware simulation — developed as part of SeOSP - 档案来源.

Size: 552 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 4 - Forks: 0

amine217c/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass

Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.

Language: Visual Basic .NET - Size: 13.5 MB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

Taowmw/Batch-Downloader-Crypter-FUD-UAC-Bypass

Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.

Language: Visual Basic .NET - Size: 24.4 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 1

Taowmw/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass

Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.

Language: Visual Basic .NET - Size: 14.1 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

loxy0dev/RedTiger-Tools

RedTiger-Tools is a free multi-tool with many features in the areas of Cybersecurity, Pentesting, OSINT, Network Scanning, Discord and Ethical Hacking. (For educational purposes only)

Language: Python - Size: 177 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 1,252 - Forks: 246

sathi2/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass

Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.

Language: Visual Basic .NET - Size: 13.5 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 4 - Forks: 2

stegman-ux/Butcher-Tools

Language: Python - Size: 434 KB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 10 - Forks: 0

whlke1/Ether-multi-tool

Ether is a multi-tool with many features in the areas of Cybersecurity, Pentesting, OSINT, Network Scanning, Discord and Hacking.

Language: Python - Size: 17.6 KB - Last synced at: 4 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

lifegood-2000/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass

Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.

Size: 1.66 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 0 - Forks: 0

Taanozm/Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native

Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.

Language: Visual Basic .NET - Size: 12.4 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 0 - Forks: 0

Taanozm/Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable

Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.

Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 0 - Forks: 0

Taanozm/Exe-To-Batch-Convert

RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.

Language: Visual Basic .NET - Size: 12.4 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 0 - Forks: 1

kheidrimessaoud/Butcher-Tools

Discover Butcher-Tools, a versatile toolkit with 35+ features for OSINT, Discord automation, and more. Stay tuned for the launch! 🌟👨💻

Size: 3.91 KB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 0 - Forks: 0

johnlass09/Batch-Downloader-Crypter-FUD-UAC-Bypass

Batch-Downloader-Crypter-FUD-UAC-Bypass offers tools for script obfuscation and encryption, enhancing security against reverse engineering. 🛡️🔒

Language: Visual Basic .NET - Size: 23.8 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 0 - Forks: 0

Reazmx/Exe-To-Batch-Convert

RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.

Language: Visual Basic .NET - Size: 12.7 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

Reazmx/Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable

Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.

Language: Visual Basic .NET - Size: 14.8 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

Reazmx/Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native

Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.

Language: Visual Basic .NET - Size: 12.6 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 1 - Forks: 0

Reazmx/Exe-To-Base64-ShellCode-Convert

Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.

Language: Visual Basic .NET - Size: 388 KB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 1 - Forks: 0

Theinxm/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass

Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.

Language: Visual Basic .NET - Size: 13.9 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

Theinxm/Batch-Downloader-Crypter-FUD-UAC-Bypass

Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.

Language: Visual Basic .NET - Size: 24.1 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

Feanrodash/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass

Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.

Language: Visual Basic .NET - Size: 13.9 MB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

Feanrodash/Batch-Downloader-Crypter-FUD-UAC-Bypass

Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.

Language: Visual Basic .NET - Size: 24.2 MB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

ZeroTrace-0/Octalyn-Forensic-Toolkit

Advanced C++ toolkit for forensic data extraction and session analysis. Supports browsers, messaging apps, gaming platforms, VPNs, and wallet environments. Ideal for red team simulations and credential management research, and real-time logging via Telegram

Language: Pascal - Size: 0 Bytes - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

MaszkKrty/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass

Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.

Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

MaszkKrty/Batch-Downloader-Crypter-FUD-UAC-Bypass

Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.

Language: Visual Basic .NET - Size: 24.7 MB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

Ohiaras/Exe-To-Batch-Convert

RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.

Language: Visual Basic .NET - Size: 13 MB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

Ohiaras/Exe-To-Base64-ShellCode-Convert

Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.

Language: Visual Basic .NET - Size: 51.8 KB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

Ohiaras/Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native

Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.

Language: Visual Basic .NET - Size: 0 Bytes - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

Ohiaras/Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable

Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.

Language: Visual Basic .NET - Size: 0 Bytes - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 1 - Forks: 0

Huyqia/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass

Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.

Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

Huyqia/Batch-Downloader-Crypter-FUD-UAC-Bypass

Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.

Language: Visual Basic .NET - Size: 24.7 MB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

Orshity/Batch-Downloader-Crypter-FUD-UAC-Bypass

Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.

Language: Visual Basic .NET - Size: 24.1 MB - Last synced at: 7 months ago - Pushed at: 7 months ago - Stars: 0 - Forks: 0

Orshity/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass

Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.

Language: Visual Basic .NET - Size: 13.9 MB - Last synced at: 7 months ago - Pushed at: 7 months ago - Stars: 0 - Forks: 0

Kartiean/Exe-To-Batch-Convert

RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.

Language: Visual Basic .NET - Size: 12.4 MB - Last synced at: 7 months ago - Pushed at: 7 months ago - Stars: 0 - Forks: 0

Kartiean/Exe-To-Base64-ShellCode-Convert

Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.

Language: Visual Basic .NET - Size: 134 KB - Last synced at: 7 months ago - Pushed at: 7 months ago - Stars: 0 - Forks: 0

Kartiean/Exe-UACBypass-Downloader-Crypter-Fud-Defender-Malware-Executable

Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.

Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 7 months ago - Pushed at: 7 months ago - Stars: 1 - Forks: 0

anonymousjer023/Exe-UACBypass-Downloader-Crypter-Fud-Defender-Malware-Executable

Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.

Language: Visual Basic .NET - Size: 13.9 MB - Last synced at: 7 months ago - Pushed at: 7 months ago - Stars: 0 - Forks: 0

Raisots/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass

Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.

Language: Visual Basic .NET - Size: 14.5 MB - Last synced at: 7 months ago - Pushed at: 7 months ago - Stars: 0 - Forks: 0

Raisots/Batch-Downloader-Crypter-FUD-UAC-Bypass

Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.

Language: Visual Basic .NET - Size: 24.7 MB - Last synced at: 7 months ago - Pushed at: 7 months ago - Stars: 0 - Forks: 0

DefinetlyNotAI/MalwareBuilder

My second largest project yet, A very simple, but intuitive Malware builder!!!

Language: Python - Size: 161 KB - Last synced at: 6 months ago - Pushed at: 7 months ago - Stars: 6 - Forks: 0

K3rnel-Dev/RunPE-Builder

Demo work of injection into someone else's address space process

Language: C# - Size: 1.5 MB - Last synced at: 8 months ago - Pushed at: 11 months ago - Stars: 0 - Forks: 1

creedster1111z/H3llware

A multitool used to d0x and pull info and log . For educational purposes only.... I am not responsible for the trouble you cause.

Size: 2.75 MB - Last synced at: 10 months ago - Pushed at: 10 months ago - Stars: 2 - Forks: 0

LotusTrojan/Virus-Maker-VB

From BlackHost

Language: Visual Basic .NET - Size: 863 KB - Last synced at: 11 months ago - Pushed at: 11 months ago - Stars: 7 - Forks: 1

Samuraibaracuda/Kadick-Doxxing-Tool

KADICK-Tools is a free multi-tool with many features in the areas of cybersecurity, pentesting and hacking.

Size: 2.09 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

Data3rr/Res0luti0n

RES0LUTI0N is a malware builder undetected by Windows Defender with an anti-VM coded in python and C#. It uses a triple layer randomized obfuscation system, a malware partitioning system and a recompilation system at the same time.

Language: Python - Size: 279 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 33 - Forks: 5

ayuly0/Luxy

Luxy is Stealer (base on Umbral Stealer) + Ransomware + Clipper (Still in Development)

Language: C# - Size: 343 KB - Last synced at: almost 2 years ago - Pushed at: over 2 years ago - Stars: 1 - Forks: 0

Cryptodev818/Exchange-Crypto-Clipboard

Create crypto address cliboard exchange virus yourself.

Size: 25.5 MB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 5 - Forks: 0

btc-stealer/crypto-clipper

The best Cryptocurrency Clipper | Bitcoin Clipper and Stealer Malware Builder

Size: 24.3 MB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 0 - Forks: 1

bestjectr/Slient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cve

One of the most complex tasks for the cyber security expert is to ensure their malicious code goes detected by antivirus and achieves its goal.

Language: C++ - Size: 632 KB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 0 - Forks: 0

bestjectr/Jpg-Png-Exploit-Downloader-Fud-Cryter-Malware-Builder-Cve-2023

Vulnerability Disclosure Timeline Closer inspection of the Exploit JPG content reveals the malicious link as well as the URL Download and Execute of the tool used to generate the Exploit JPG from Python encrypted code content which we also implement in couple of our builders.

Language: C++ - Size: 649 KB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 0 - Forks: 0

Pyran1/RAT-Collection

Remote Access Trojan collection.(260+ RAT-Builders!)

Size: 1000 MB - Last synced at: over 2 years ago - Pushed at: over 3 years ago - Stars: 86 - Forks: 16

cookie0o/py-crypter-builder 📦

A Malware Virus builder made in 100% Python and auto compile.

Language: Python - Size: 81.1 KB - Last synced at: over 2 years ago - Pushed at: almost 3 years ago - Stars: 0 - Forks: 0