AlphaDelta / Secure-Desktop
Anti-keylogger/anti-rat application for Windows
☆246Updated 3 years ago
Alternatives and similar repositories for Secure-Desktop:
Users that are interested in Secure-Desktop are comparing it to the libraries listed below
- DarkAgent Remote Administration Tool RAT by DragonHunter☆138Updated 12 years ago
- Athena Botnet Source Code☆150Updated 9 years ago
- peinjector - MITM PE file infector☆604Updated 8 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆343Updated 2 years ago
- A collection of post-exploitation tools for network red teaming.☆138Updated 6 years ago
- ☆165Updated 8 years ago
- Windows Remote Access Trojan (RAT)☆81Updated 9 years ago
- A TCP proxy over named pipes. Originally created for maintaining a meterpreter session over 445 for less network alarms.☆241Updated 3 years ago
- An Advanced C# .NET Rat, It’s Stable and Contains Many Features.☆269Updated 6 years ago
- ZeroAccess v3 toolkit☆164Updated 7 years ago
- A resilient peer-to-peer botnet agent in .NET☆75Updated 8 years ago
- Tinba Banking Trojan☆84Updated 10 years ago
- ☆127Updated 9 years ago
- EternalRocks worm☆458Updated 7 years ago
- A fast and advanced ransomware PoC☆60Updated 9 years ago
- Previously-0day exploit from the Hacking Team leak, written by Eugene Ching/Qavar.☆197Updated 9 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic and Bypassing Anti-viruses☆269Updated last year
- Searches for strings, regex, credit card numbers of magnetic stripe card tracks in a Windows process's memory space☆125Updated 4 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- Meterpreter Encrypted Payload by C#☆163Updated last year
- Windows 7 UAC Bypass Vulnerability in the Windows Script Host☆106Updated 9 years ago
- Carberp Banking Trojan☆113Updated 10 years ago
- ☆516Updated 7 years ago
- Tool to disable Intel AMT on Windows☆140Updated 7 years ago
- A rogue-USB-device defeat program for Windows.☆188Updated 2 years ago
- 👁🗨 This script will simulate fake processes of analysis sandbox/VM software that some malware will try to avoid.☆141Updated last year
- Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.☆72Updated 8 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆493Updated 7 years ago
- Pythonic ransomware proof of concept.☆218Updated 4 years ago
- A General Purpose DLL & Code Injection Utility☆154Updated 7 years ago