11philip22 / MEGAabuse
uploads unlimited files......... for free
☆12Updated 3 years ago
Alternatives and similar repositories for MEGAabuse:
Users that are interested in MEGAabuse are comparing it to the libraries listed below
- DarkRats Standalone HVNC☆23Updated 2 years ago
- TaskMgr Volatile Environment LPE☆13Updated 2 months ago
- Enter Product Key Volatile Environment LPE☆12Updated 2 months ago
- A simple AES malware crypter☆16Updated 6 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 2 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 5 years ago
- Multipurpose malware framework☆23Updated 3 years ago
- Disabling Windows Defender & downloading payload☆20Updated 4 years ago
- Conquer the deep ocean, host an .onion site fast!☆15Updated 2 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 3 years ago
- Simple keylogger written in C# which is ready for modifications.☆13Updated 3 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆12Updated 3 years ago
- Sysprep Volatile Environment LPE (2017)☆14Updated 2 months ago
- Basic disassembly technique to slow down disasm process☆10Updated 5 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆8Updated 3 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆10Updated 6 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 5 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆28Updated 3 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆10Updated 3 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Updated 2 years ago
- Trolling Keyloggers by Forcing them to log Specific Text then freezing them☆20Updated 2 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆16Updated 5 years ago
- ☆18Updated 4 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 5 years ago
- Loader and RunPE file executer☆16Updated 5 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆35Updated 5 years ago
- ☣️ Necro Stealer + Web Panel☆10Updated 4 years ago
- Non organized Cpp code files I used for my research on Windows☆18Updated 4 years ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆18Updated 5 years ago