BomboBombone / RattusoLinks
A very weird RAT
β19Updated 2 years ago
Alternatives and similar repositories for Rattuso
Users that are interested in Rattuso are comparing it to the libraries listed below
Sorting:
- π» Windows 10 Kernel-mode rootkitβ31Updated 2 years ago
- An attempt at reversing WindowsDefenderβ20Updated 7 months ago
- Bypass UAC by abusing shell protocol handlersβ14Updated 3 years ago
- π§ C# UAC Bypass technique using mock directories π§β28Updated 2 years ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.β19Updated 2 years ago
- Overwrite MBR and add own custom messageβ17Updated 5 years ago
- β25Updated 7 months ago
- Making Shellcode fully undetectable using uuidβ23Updated 4 years ago
- Simple keylogger written in C# which is ready for modifications.β14Updated 3 years ago
- Bypassing windows uac, however its an old approach/method but its still unpatched Β―\_(γ)_/Β―β44Updated 3 years ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBFβ14Updated last year
- using the Recycle Bin to insure persistenceβ12Updated 2 years ago
- Get/dump chrome and firefox saved passwords.β20Updated 4 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of courseβ29Updated 2 years ago
- Source Code for BlueEagle jRAT & Release β πβ£βBlue Eagle jRAT is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT]β¦β1Updated 2 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/systemβ11Updated 3 years ago
- Example of C# heap injector for x64 and x86 shellcodesβ14Updated 2 years ago
- A windows kernel-mode rootkit with remote controlβ12Updated 2 years ago
- This script make any windows compatible with RDP connectionβ19Updated 4 months ago
- Fully undetectable UAC Bypass exploit - https://youtu.be/KfOPW0XI99sβ17Updated 3 years ago
- β£οΈ Necro Stealer + Web Panelβ10Updated 5 years ago
- TaskMgr Volatile Environment LPEβ13Updated 6 months ago
- It contains malicious features that can steal files from BitRAT tools.β11Updated 3 years ago
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Techniqueβ11Updated 6 months ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executabβ¦β43Updated 3 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.β12Updated 5 years ago
- Change hash for a signed peβ16Updated last year
- Payload Dropper with Persistance & Privesc & UAC bypass π±βπ€β13Updated last year
- Listing UDP connections with remote address without sniffing.β29Updated last year
- Malware persistence via COM DLL hijacking. C++ implementation exampleβ13Updated 3 years ago