CesarAyalaDev / RAASNet
☆122Updated last year
Alternatives and similar repositories for RAASNet:
Users that are interested in RAASNet are comparing it to the libraries listed below
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆109Updated last year
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆255Updated 4 years ago
- Create a fully undetectable backdoor with simple steps.☆74Updated 3 years ago
- The LockBit builder files☆111Updated last year
- C2 server to connect to a victim machine via reverse shell☆54Updated 3 years ago
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆160Updated last year
- Generate FUD backdoors☆245Updated 2 years ago
- A solution to create obfuscated reverse shells for PowerShell.☆77Updated 2 years ago
- RansomwareSim is a simulated ransomware☆153Updated 11 months ago
- AV evading OSX Backdoor and Crypter Framework☆286Updated last year
- zerosum0x0's Koadic☆294Updated 3 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆129Updated 2 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆60Updated 3 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆293Updated 10 months ago
- ☆147Updated last year
- The Havoc Framework☆56Updated 2 years ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆141Updated last year
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆98Updated last year
- PowerShell Ransomware Simulator with C2 Server☆483Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆106Updated last year
- Just some lists of Malware Configs☆169Updated 3 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆67Updated last month
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆56Updated last year
- This repository contains a few leaked files of HookBot.☆104Updated last year
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆25Updated last year
- Command & Control-Framework created for collaboration in python3☆317Updated last year
- Polymorphic Command & Control☆76Updated 2 months ago
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆310Updated 8 months ago