CesarAyalaDev / RAASNet
☆119Updated 10 months ago
Alternatives and similar repositories for RAASNet:
Users that are interested in RAASNet are comparing it to the libraries listed below
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆105Updated last year
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆235Updated 3 years ago
- C2 server to connect to a victim machine via reverse shell☆51Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆123Updated last year
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆89Updated last year
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆157Updated last year
- Create a fully undetectable backdoor with simple steps.☆73Updated 2 years ago
- Generate FUD backdoors☆243Updated last year
- A solution to create obfuscated reverse shells for PowerShell.☆74Updated 2 years ago
- PowerShell Ransomware Simulator with C2 Server☆472Updated last year
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆68Updated last year
- This repository contains a few leaked files of HookBot.☆104Updated last year
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆278Updated 7 months ago
- This is for Ethical Use only!☆27Updated last week
- Persistent Powershell backdoor tool {😈}☆111Updated 6 months ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆42Updated last month
- The LockBit builder files☆95Updated last year
- Just some lists of Malware Configs☆168Updated last month
- The Havoc Framework☆54Updated 2 years ago
- Living Off The Land (LOTL) persistent Reverse shell☆95Updated last year
- 🔬Collection of malware, ransomware, RATs, botnets, stealers, etc.☆115Updated 3 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆125Updated 6 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆58Updated 3 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆122Updated 2 years ago
- ☆95Updated 2 years ago
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆51Updated 2 years ago
- A collection of Cobalt Strike Aggressor scripts.☆91Updated 3 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆175Updated 6 months ago
- RansomwareSim is a simulated ransomware☆149Updated 8 months ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆130Updated last year