BlueSkySt / Joker
Joker Botnet Source LEAKED
☆12Updated 3 years ago
Alternatives and similar repositories for Joker:
Users that are interested in Joker are comparing it to the libraries listed below
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆21Updated 3 years ago
- The Cayosin Bot features unique RHex STD and RHex HTTP attacks. Meaning that the Hex Strings are randomly selected. Cayosin also contains…☆12Updated 4 years ago
- Remote Access Tool Written In C#☆12Updated 2 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 4 years ago
- A very weird RAT☆20Updated 2 years ago
- ☆9Updated 4 years ago
- ⚡ Create infinate UAC prompts forcing a user to run as admin ⚡☆11Updated 2 years ago
- ☣️ Necro Stealer + Web Panel☆10Updated 4 years ago
- 🚀 Builder of Malware Loader☆15Updated 4 years ago
- TaskMgr Volatile Environment LPE☆13Updated 2 months ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- DarkRats Standalone HVNC☆24Updated 2 years ago
- Simple Ransoware to attack Windows 🌟☆18Updated last year
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Updated 2 years ago
- An advanced malware framework.☆10Updated 3 years ago
- Multipurpose malware framework☆23Updated 3 years ago
- Collecting Some Ransomeware Sources For educational pruposes Only .☆9Updated 2 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- ☆14Updated 3 years ago
- Decompiled NotPetya File Encryptor Code☆14Updated 2 years ago
- A repository containing C concepts I made when I was bored. You can also use this repository to learn C yourself.☆8Updated 3 years ago
- This repository will present all Information interest about Thanatos Ransomware after analysis☆8Updated 5 years ago
- ADR is a trojan that retrieves all information on the computer and all data stored in applications using chormuim. It recovers cookies, t…☆24Updated last year
- An ADB-based botnet written in C.☆41Updated 2 years ago
- Remote Administration Tool For Windows VB.NET☆10Updated 5 years ago
- Fully undetectable UAC Bypass exploit - https://youtu.be/KfOPW0XI99s☆16Updated 3 years ago
- Simple keylogger written in C# which is ready for modifications.☆13Updated 3 years ago
- Basic disassembly technique to slow down disasm process☆10Updated 5 years ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆14Updated last year
- Persistent & Undetectable Malware Backdoor☆28Updated 8 months ago