Ares-X / carbanak_source_code_leakLinks
Carbanak source code leak.
☆9Updated 7 years ago
Alternatives and similar repositories for carbanak_source_code_leak
Users that are interested in carbanak_source_code_leak are comparing it to the libraries listed below
Sorting:
- Windows Malware Probe of Concept☆21Updated 3 years ago
- Component Services Volatile Environment LPE☆12Updated 2 weeks ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- Zerokit shared code☆17Updated 6 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 8 years ago
- Various Crypter Project☆9Updated 11 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- Zerokit server controller☆14Updated 6 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆33Updated 7 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 12 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Several self-defense shellcodes☆22Updated 6 years ago
- A Linux RAT in C☆35Updated 6 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Updated 6 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 4 years ago
- Version 2.0 of CrunchRAT - A macOS and Linux Remote Access Tool (RAT)☆7Updated 8 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 7 years ago
- ☆8Updated 7 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- Display Languages Volatile Environment LPE☆11Updated 2 weeks ago
- ☆24Updated 7 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 9 years ago
- Notes and goodies to make binary exploitation life easier☆10Updated 6 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆13Updated 7 years ago
- Debugger checks in 3 ways☆20Updated 7 years ago
- ☆23Updated 9 years ago
- Backdoor for Windows systems (client and server) writen in C (client) and ASM (server) using reverse connection☆19Updated 11 years ago