CesarAyalaDev / RAASNetLinks
☆125Updated last year
Alternatives and similar repositories for RAASNet
Users that are interested in RAASNet are comparing it to the libraries listed below
Sorting:
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆118Updated last year
- The LockBit builder files☆142Updated last year
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆269Updated 4 years ago
- RansomwareSim is a simulated ransomware☆167Updated last year
- Generate FUD backdoors☆263Updated 2 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆142Updated 3 years ago
- Living Off The Land (LOTL) persistent Reverse shell☆104Updated last year
- Small collection of Ransomware organized by family.☆263Updated last year
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆73Updated 2 years ago
- AV evading cross platform Backdoor and Crypter Framework with a integrated lightweight webUI☆306Updated 3 weeks ago
- A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS☆135Updated 4 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆341Updated last year
- C2 server to connect to a victim machine via reverse shell☆53Updated 3 years ago
- PowerShell Ransomware Simulator with C2 Server☆493Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 8 months ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆207Updated 4 months ago
- Just some lists of Malware Configs☆173Updated 10 months ago
- A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualiz…☆55Updated 7 months ago
- Create a fully undetectable backdoor with simple steps.☆76Updated 3 years ago
- zerosum0x0's Koadic☆328Updated 3 years ago
- Python based c2 server with a basic beacon server to route the traffic from dummy server to prevent attacker's ip from getting exposed☆25Updated 6 years ago
- Repo containing cracked red teaming tools.☆208Updated last month
- The Havoc Framework☆61Updated 3 years ago
- ☆161Updated 2 years ago
- Undetectable payload for Windows 10 and 11☆40Updated 2 years ago
- A solution to create obfuscated reverse shells for PowerShell.☆82Updated 3 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆68Updated 4 years ago
- Command & Control-Framework created for collaboration in python3☆318Updated 2 years ago
- List Of Ransomware Groups Official WebSites☆119Updated last week
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated 2 years ago