CesarAyalaDev / RAASNetLinks
☆123Updated last year
Alternatives and similar repositories for RAASNet
Users that are interested in RAASNet are comparing it to the libraries listed below
Sorting:
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆116Updated last year
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆262Updated 4 years ago
- The LockBit builder files☆128Updated last year
- RansomwareSim is a simulated ransomware☆157Updated last year
- Generate FUD backdoors☆249Updated 2 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆138Updated 3 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆70Updated 4 months ago
- A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS☆124Updated 4 years ago
- Just some lists of Malware Configs☆172Updated 7 months ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆193Updated last month
- C2 server to connect to a victim machine via reverse shell☆54Updated 3 years ago
- zerosum0x0's Koadic☆311Updated 3 years ago
- AV evading OSX Backdoor and Crypter Framework☆293Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆63Updated 4 years ago
- ☆159Updated 2 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆310Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- PowerShell Ransomware Simulator with C2 Server☆486Updated last year
- Small collection of Ransomware organized by family.☆243Updated 10 months ago
- Persistent Powershell backdoor tool {😈}☆119Updated last year
- Repo containing cracked red teaming tools.☆191Updated 2 weeks ago
- Create a fully undetectable backdoor with simple steps.☆75Updated 3 years ago
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆168Updated 2 years ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆275Updated 5 months ago
- The Havoc Framework☆59Updated 2 years ago
- Python based c2 server with a basic beacon server to route the traffic from dummy server to prevent attacker's ip from getting exposed☆25Updated 6 years ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆98Updated this week
- Fork from @rsmudge/armitage☆134Updated 2 years ago
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆13Updated 2 years ago
- Remote persistent 🔑Logger for Windows and Linux☆298Updated 2 years ago