93aef0ce4dd141ece6f5 / File-BinderLinks
Binds two files together and updates the stub accordingly. The stub will then drop and execute both files.
☆15Updated 9 years ago
Alternatives and similar repositories for File-Binder
Users that are interested in File-Binder are comparing it to the libraries listed below
Sorting:
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 5 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Updated 5 years ago
- Control Panel and Builder (Working)☆10Updated 8 years ago
- This is a project with .net server crypter for bypass AV's Runtime detection.☆11Updated 8 years ago
- Disabling Windows Defender & downloading payload☆21Updated 5 years ago
- DarkRats Standalone HVNC☆25Updated 3 years ago
- Simple protector to show how to run a payload without dropping it using RunPE Technique☆35Updated 8 years ago
- Download payload to disk and install it to startup then melt.☆35Updated 6 years ago
- ☆19Updated 5 years ago
- DarkC0ders net is a open source botnet which is programmed in C#, using the .NET 2.0 Framework.☆10Updated 6 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 8 years ago
- C# Codedom example / builder☆24Updated 5 years ago
- Simple C# Keylogger (Keyboard Layout)☆65Updated 6 years ago
- This script make any windows compatible with RDP connection☆21Updated 6 months ago
- ZeroRemote Trojan SRC Extract☆19Updated 8 years ago
- Sysprep Volatile Environment LPE (2017)☆16Updated 7 months ago
- Bypass UAC by abusing shell protocol handlers☆14Updated 4 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆30Updated 4 years ago
- Basic disassembly technique to slow down disasm process☆11Updated 6 years ago
- An advanced Windows Keylogger with features like (Disable CMD, Screenshotter, Client Stub Builder, Low Level Keyhooks, Hide Application, …☆32Updated 8 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆15Updated 8 years ago
- Power Loader botnet☆41Updated 10 years ago
- Word Macro Virus that has a Powershell based Download & Execute Payload☆22Updated 9 years ago
- ☣️ Necro Stealer + Web Panel☆10Updated 5 years ago
- Silent Monero (XMR) CPU miner☆23Updated 7 years ago
- Icon Changer, File Pumper & Extension Spoofer - Quickly Modify Executable Files☆66Updated 8 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆47Updated 8 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 6 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆30Updated 7 years ago
- TaskMgr Volatile Environment LPE☆16Updated 7 months ago