malware-builder

There are 15 repositories under malware-builder topic.

  • RedTiger-Tools

    loxy0dev/RedTiger-Tools

    RedTiger-Tools is a free multi-tool with many features in the areas of Cybersecurity, Pentesting, OSINT, Network Scanning, Discord and Ethical Hacking. (For educational purposes only)

    Language:Python1.6k330300
  • Pyran1/RAT-Collection

    Remote Access Trojan collection.(260+ RAT-Builders!)

  • Res0luti0n

    Data3rr/Res0luti0n

    (Beta) RES0LUTI0N is a malware builder undetected by Windows Defender with an anti-VM coded in python and C#. It uses a triple layer randomized obfuscation system, a malware partitioning system and a recompilation system at the same time.

    Language:Python543110
  • Butcher-Tools
  • DefinetlyNotAI/MalwareBuilder

    My second largest project yet, A very simple, but intuitive Malware builder!!!

    Language:Python8100
  • LotusTrojan/Virus-Maker-VB

    From BlackHost

    Language:Visual Basic .NET8112
  • ayuly0/Luxy

    Luxy is Stealer (base on Umbral Stealer) + Ransomware + Clipper (Still in Development)

    Language:C#3202
  • amine217c/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass

    Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.

    Language:Visual Basic .NET
  • Tarekmets/Exe-To-Base64-ShellCode-Convert

    Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.

    Language:Visual Basic .NET
  • Tarekmets/Exe-To-Batch-Convert

    RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.

    Language:Visual Basic .NET
  • Tarekmets/Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable

    Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.

    Language:Visual Basic .NET
  • Tarekmets/Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native

    Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.

    Language:Visual Basic .NET
  • Vadelarez/Batch-Downloader-Crypter-FUD-UAC-Bypass

    Crypter encrypts malware to evade detection, often paired with FUD or UAC bypass techniques. Batch files serve as malware downloaders or trojans, created using builders. Tools like batch crypter or fud crypter ensure stealth.

    Language:Visual Basic .NET
  • Vadelarez/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass

    Crypter hides malware with encryption, often providing FUD features. Tools like crypter FUD or batch FUD ensure undetected execution. Obfuscation bypasses antivirus and Windows Defender. Batch malware, trojans, and stealers are built using specialized tools.

    Language:Visual Basic .NET
  • whlke1/Ether-multi-tool

    Ether is a multi-tool with many features in the areas of Cybersecurity, Pentesting, OSINT, Network Scanning, Discord and Hacking.

    Language:Python