CesarAyalaDev / RAASNetLinks
☆124Updated last year
Alternatives and similar repositories for RAASNet
Users that are interested in RAASNet are comparing it to the libraries listed below
Sorting:
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆118Updated last year
- The LockBit builder files☆142Updated last year
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆268Updated 4 years ago
- Generate FUD backdoors☆262Updated 2 years ago
- Small collection of Ransomware organized by family.☆264Updated last year
- RansomwareSim is a simulated ransomware☆168Updated last year
- C2 server to connect to a victim machine via reverse shell☆54Updated 3 years ago
- zerosum0x0's Koadic☆328Updated 3 years ago
- ☆186Updated 2 years ago
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆175Updated 2 years ago
- AV evading cross platform Backdoor and Crypter Framework with a integrated lightweight webUI☆308Updated last month
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆208Updated 5 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆344Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 8 months ago
- PowerShell Ransomware Simulator with C2 Server☆496Updated last year
- Repo containing cracked red teaming tools.☆214Updated last month
- Python based c2 server with a basic beacon server to route the traffic from dummy server to prevent attacker's ip from getting exposed☆25Updated 6 years ago
- Command & Control-Framework created for collaboration in python3☆318Updated 2 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆69Updated 4 years ago
- A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS☆135Updated 4 years ago
- Create a fully undetectable backdoor with simple steps.☆77Updated 3 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated 2 years ago
- Just some lists of Malware Configs☆173Updated 11 months ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆281Updated 9 months ago
- The Havoc Framework☆63Updated 3 years ago
- Persistent Powershell backdoor tool {😈}☆121Updated last year
- A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualiz…☆56Updated 7 months ago
- Fork from @rsmudge/armitage☆140Updated 3 years ago
- Remote persistent 🔑Logger for Windows and Linux☆296Updated 2 years ago