☆124Mar 20, 2024Updated last year
Alternatives and similar repositories for RAASNet
Users that are interested in RAASNet are comparing it to the libraries listed below
Sorting:
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆61May 3, 2024Updated last year
- Rats sources☆10Feb 23, 2022Updated 4 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Hello World in Assembly and C☆10Jul 9, 2025Updated 8 months ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- ☆10Nov 21, 2023Updated 2 years ago
- ☆22Aug 16, 2025Updated 6 months ago
- IOCTL++ can be used to make DeviceIoControl requests with arbitrary inputs.☆35Oct 28, 2025Updated 4 months ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆15Aug 8, 2025Updated 7 months ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.☆16Nov 27, 2025Updated 3 months ago
- ☆13Dec 24, 2023Updated 2 years ago
- Random tips and tricks RE: ransomware☆14Aug 17, 2021Updated 4 years ago
- Kiwi PN532 SPI library for Arduino☆15Feb 2, 2026Updated last month
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- AntiRansomware Linux Kernel Module☆37May 25, 2023Updated 2 years ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆386Jul 30, 2024Updated last year
- netcat-like CLI tool with advanced features for bind/reverse shells☆19Oct 29, 2025Updated 4 months ago
- A small executable to trick a user to authenticate using code matching MFA☆68Oct 6, 2023Updated 2 years ago
- M5Stack GSM Wardriver☆19Apr 22, 2023Updated 2 years ago
- PowerShell Module for parsing logs generated by Sysinternals Sysmon for Linux☆37Mar 20, 2022Updated 3 years ago
- ☆16Mar 6, 2019Updated 7 years ago
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆45Mar 24, 2025Updated 11 months ago
- XSSRecon automates the process of testing URL parameters for reflection of a test payload rix4uni and further checks how special characte…☆52Jan 16, 2026Updated last month
- this nuclei template finds back up files☆22Aug 25, 2025Updated 6 months ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Dec 21, 2018Updated 7 years ago
- Go Ransomware (YouTube)☆22Nov 17, 2022Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- Repository for all cbapi example scripts☆16Sep 18, 2018Updated 7 years ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆113Sep 17, 2025Updated 5 months ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Jun 17, 2023Updated 2 years ago
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Mar 5, 2021Updated 5 years ago
- Easy red team phishing with Puppeteer☆132Feb 6, 2023Updated 3 years ago
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆27Mar 8, 2023Updated 3 years ago
- Open-Source Ransomware As A Service for Linux, MacOS and Windows☆15Dec 20, 2020Updated 5 years ago
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆23Jun 22, 2021Updated 4 years ago