Home

Awesome

Awesome Malware Awesome

A curated collection of awesome malware, botnets, and other post-exploitation tools.

Malware is software intentionally designed to cause damage or provide unauthorized access to a computer, server, or computer network. While not exclusive, this list is heavily biased towards Free Software projects. For pre-exploitation TTPs, see awesome-pentest. For defenses, see awesome-cybersecurity-blueteam.

Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Please check the Contributing Guidelines for more details. This work is licensed under a Creative Commons Attribution 4.0 International License.

:warning: :memo: Please note that this compilation is intended for educational and demonstration purposes only.

Contents

Analysis and reverse engineering

See awesome-malware-analysis.

Banking trojans

:construction: TK-TODO

Botnets

Command and Control

(Also known as C2 and C&C.)

Credential Stuffing Account Checkers

Also known as Account Takeover (ATO) or account cracking.

Data stealers

:construction: TK-TODO

Evasion

Keyloggers

Phishing kits

(Also known as phishkits, one word.)

RAM scrapers

:construction:

See RamScraper for now.

Ransomware

:construction: TK-TODO

Remote Administration Tools (RATs)

Some Command and Control tools also overlap with RAT software.

(Also known as Remote Access Trojan or post-exploitation agent.)

Rootkits

Web Shells

(Also known as webshells, one word.)

License

CC-BY

This work is licensed under a Creative Commons Attribution 4.0 International License.