CesarAyalaDev / RAASNet
☆119Updated last year
Alternatives and similar repositories for RAASNet:
Users that are interested in RAASNet are comparing it to the libraries listed below
- Generate FUD backdoors☆245Updated 2 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆108Updated last year
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆252Updated 4 years ago
- Create a fully undetectable backdoor with simple steps.☆74Updated 3 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆60Updated 3 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆69Updated 2 years ago
- C2 server to connect to a victim machine via reverse shell☆53Updated 3 years ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆99Updated last year
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆157Updated last year
- ☆148Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆128Updated 2 years ago
- A solution to create obfuscated reverse shells for PowerShell.☆76Updated 2 years ago
- AV evading OSX Backdoor and Crypter Framework☆281Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆98Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆66Updated last week
- The Havoc Framework☆56Updated 2 years ago
- zerosum0x0's Koadic☆290Updated 3 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆289Updated 9 months ago
- The LockBit builder files☆106Updated last year
- ☆103Updated 7 months ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆77Updated last year
- Python based c2 server with a basic beacon server to route the traffic from dummy server to prevent attacker's ip from getting exposed☆26Updated 5 years ago
- A simple stiller with sending logs to your EMAIL, in case of inactivity, write to me in Discord- R3VENGE#1539☆56Updated 2 years ago
- RansomwareSim is a simulated ransomware☆153Updated 10 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆129Updated 8 months ago
- Persistent Powershell backdoor tool {😈}☆116Updated 8 months ago
- Command & Control-Framework created for collaboration in python3☆317Updated last year
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆20Updated 4 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆178Updated 8 months ago