93aef0ce4dd141ece6f5 / File-Binder
Binds two files together and updates the stub accordingly. The stub will then drop and execute both files.
☆15Updated 8 years ago
Alternatives and similar repositories for File-Binder:
Users that are interested in File-Binder are comparing it to the libraries listed below
- Disabling Windows Defender & downloading payload☆20Updated 4 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 4 years ago
- DarkRats Standalone HVNC☆24Updated 2 years ago
- HTTP BOTNET☆7Updated last year
- This is a project with .net server crypter for bypass AV's Runtime detection.☆11Updated 7 years ago
- This script make any windows compatible with RDP connection☆18Updated last month
- Silent Monero (XMR) CPU miner☆23Updated 6 years ago
- Control Panel and Builder (Working)☆10Updated 7 years ago
- POC runtime crypter☆9Updated 6 years ago
- This is a plugin for the c# R.A.T Server providing extension to javascript based browser botnets☆26Updated 7 years ago
- DarkC0ders net is a open source botnet which is programmed in C#, using the .NET 2.0 Framework.☆10Updated 5 years ago
- Download payload to disk and install it to startup then melt.☆35Updated 5 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 3 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆14Updated 5 years ago
- Basic disassembly technique to slow down disasm process☆10Updated 5 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- using VBS to download and install a powershell malware☆39Updated 5 years ago
- UAC Bypass for windows☆37Updated 5 years ago
- Power Loader botnet☆39Updated 10 years ago
- ☣️ Necro Stealer + Web Panel☆10Updated 4 years ago
- TaskMgr Volatile Environment LPE☆13Updated 3 months ago
- ☆12Updated 7 years ago
- A Chrome extension to steal your passwords☆20Updated 3 years ago
- Generate a ms batch file and inject a files inside of it. When the batch is executed, the files are extracted and executed.☆21Updated 5 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 5 years ago
- Attempt at recreating a windows-based DKOM rootkit using c#☆11Updated 8 years ago
- ZeroRemote Trojan SRC Extract☆19Updated 8 years ago
- Simple protector to show how to run a payload without dropping it using RunPE Technique☆35Updated 7 years ago
- Batch NetWork Worm with Download & Execute Payload☆12Updated 4 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 5 years ago