Malware Showcase - Understand Malicious Software With Practical Examples in Python

Malware Showcase – Understand Malicious Software With Practical Examples

Malware Showcase This repository contains explanatory examples of malicious behavior like file infection or remote code execution. It’s supposed to demonstrate and explain the nature of malicious software with practical examples in Python….

Read more »
What is Botnet - How Botnet Work

BSF – Botnet Simulation Framework

Botnet is become dangerous threat on internet, if your computer infect by this kind of malicious sofware, then your computer become one of attacker bot that remotely can execute some…

Read more »
EvilPDF - Embedding Executable Files in PDF Documents to hack a computer

EvilPDF – Embedding Executable Files in PDF Documents

To hack a computer you need to perform social engineering to convince user to install our malware. If youre malware is just blank executable, then the user maybe suspicious and…

Read more »
Getdroid - Fully Undetectable Android Payload and Listener

Getdroid – Fully Undetectable Android Payload and Listener

To hack a android phone or iOS and also spying on someone phone you need to get access to connect your device to the victim phone, malicious application is one…

Read more »
RAASNet Demo - Open-Source Ransomware As A Service for Linux, MacOS and Windows

RAASNet – Open-Source Ransomware As A Service for Linux, MacOS and Windows

RAASNet is an Open-Source Ransomware As A Service for Linux, MacOS and Windows. Tool to make undetectable (FUD) ransomware with multiple encryption methods.

Read more »
DDoor - Cross Platform Backdoor Using DNS txt Records xploitlab

DDoor – Cross Platform Backdoor Using DNS txt Records

To hack any devices attacker mostly use trojan/backdoor that infect victim machine and gain access into it. DDoor is a cross platform backdoor.

Read more »
IoT-Implant-Toolkit - what is IoT devices

IoT-Implant-Toolkit – Toolkit for Implant Attack of IoT Devices

IoT-Implant-Toolkit is a framework of useful tools for malware implantation research of IoT devices. Tested implanted Trojans in eight different devices.

Read more »