3ct0s / fud-backdoorView external linksLinks
Create a fully undetectable backdoor with simple steps.
☆77Mar 22, 2022Updated 3 years ago
Alternatives and similar repositories for fud-backdoor
Users that are interested in fud-backdoor are comparing it to the libraries listed below
Sorting:
- Chrome Credential Stealer that reports to Discord through Webhooks☆39Mar 11, 2022Updated 3 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Aug 13, 2022Updated 3 years ago
- decompiled pegasus_spyware☆14Jul 31, 2021Updated 4 years ago
- C2 redirector as a web API☆10May 22, 2021Updated 4 years ago
- A Simple AES Command Line Crypter☆40Jan 19, 2023Updated 3 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- DarkRat source - beware untested source and resources.☆21Dec 7, 2019Updated 6 years ago
- Direct syscalls Injection to bypass AV/EDR☆12May 18, 2024Updated last year
- Injecting shellcode into a process memory and executing it in C#☆52Oct 2, 2022Updated 3 years ago
- It contains malicious features that can steal files from BitRAT tools.☆11Dec 19, 2021Updated 4 years ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Aug 21, 2023Updated 2 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Aug 6, 2019Updated 6 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- A Hidden and Undetectable Remote Access Tool written in C++ and Server in Python3.☆69Jan 25, 2024Updated 2 years ago
- The malware is un-killable and fully undetectable by antivirus, developed by Kingsman. It steals the browser passwords, Discord Tokens & …☆60Jul 11, 2021Updated 4 years ago
- Collection of Offensive C# Tooling☆13Nov 4, 2021Updated 4 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Download a .NET payload and run it on memory☆70Apr 12, 2019Updated 6 years ago
- Android+Windows Rat + Fud payload☆216Dec 19, 2022Updated 3 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Aug 17, 2022Updated 3 years ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago
- ☆24Nov 28, 2021Updated 4 years ago
- Troyano espía, Keylogger para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. Envía los datos mediante G…☆12May 9, 2020Updated 5 years ago
- Fully FUD keylogger that can bypass windows 11 & windows 10 defender protection and all kinds of Antivirus protections also.☆20Oct 9, 2021Updated 4 years ago
- Hide malware behind a legit process C#☆129Mar 1, 2020Updated 5 years ago
- A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.☆224Jun 13, 2021Updated 4 years ago
- androrat☆22Nov 6, 2019Updated 6 years ago
- A simple shell code encryptor/decryptor/executor to bypass anti virus.☆471Dec 13, 2021Updated 4 years ago
- Cronos Crypter is an simple example of crypter created for educational purposes.☆104Sep 19, 2024Updated last year
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆23Nov 20, 2022Updated 3 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Undetectable Keylogger that reports to Discord☆74Jul 9, 2024Updated last year
- NTAPI hook bypass with (semi) legit stack trace☆18May 9, 2023Updated 2 years ago
- ☆13Jun 29, 2023Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Dec 19, 2023Updated 2 years ago
- ☆16Jan 12, 2022Updated 4 years ago
- remote administrator framework☆22Aug 9, 2024Updated last year