BomboBombone / RattusoLinks
A very weird RAT
β19Updated 2 years ago
Alternatives and similar repositories for Rattuso
Users that are interested in Rattuso are comparing it to the libraries listed below
Sorting:
- π» Windows 10 Kernel-mode rootkitβ31Updated 2 years ago
- Malware persistence via COM DLL hijacking. C++ implementation exampleβ13Updated 3 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.β14Updated 6 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.β27Updated 5 years ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.β19Updated 2 years ago
- Bypassing windows uac, however its an old approach/method but its still unpatched Β―\_(γ)_/Β―β44Updated 3 years ago
- Multipurpose malware frameworkβ26Updated 3 years ago
- Read my blog for more info -β31Updated 4 years ago
- β£οΈ Necro Stealer + Web Panelβ10Updated 5 years ago
- Process injection via KernelCallbackTableβ14Updated 3 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++β35Updated 3 years ago
- β25Updated 8 months ago
- Collection of shellcode injection and execution techniquesβ17Updated 3 years ago
- π§ C# UAC Bypass technique using mock directories π§β28Updated 2 years ago
- Process Hollowing demonstration & explanationβ35Updated 4 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malwareβ28Updated 5 years ago
- π»Can run your executable from hex memoryβ7Updated 4 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.β110Updated last year
- Bypass UAC at any level by abusing the Task Scheduler and environment variablesβ31Updated 4 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of courseβ28Updated 3 years ago
- An attempt at reversing WindowsDefenderβ20Updated 9 months ago
- DarkRats Standalone HVNCβ24Updated 3 years ago
- Bypass UAC by abusing shell protocol handlersβ14Updated 4 years ago
- A Bumblebee-inspired Crypterβ79Updated 2 years ago
- Basic disassembly technique to slow down disasm processβ11Updated 5 years ago
- A windows kernel-mode rootkit with remote controlβ12Updated 2 years ago
- using the gpu to hide your payloadβ59Updated 2 years ago
- Example of C# heap injector for x64 and x86 shellcodesβ14Updated 2 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.β71Updated 4 years ago
- BitRat Source Codeβ42Updated 4 years ago