CesarAyalaDev / RAASNetLinks
☆123Updated last year
Alternatives and similar repositories for RAASNet
Users that are interested in RAASNet are comparing it to the libraries listed below
Sorting:
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆116Updated last year
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆267Updated 4 years ago
- The LockBit builder files☆135Updated last year
- Generate FUD backdoors☆254Updated 2 years ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆199Updated 2 months ago
- ☆159Updated 2 years ago
- zerosum0x0's Koadic☆319Updated 3 years ago
- C2 server to connect to a victim machine via reverse shell☆53Updated 3 years ago
- The Havoc Framework☆59Updated 3 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 6 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆141Updated 3 years ago
- RansomwareSim is a simulated ransomware☆162Updated last year
- AV evading OSX Backdoor and Crypter Framework☆302Updated 3 weeks ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆64Updated 4 years ago
- PowerShell Ransomware Simulator with C2 Server☆488Updated last year
- Small collection of Ransomware organized by family.☆254Updated last year
- Create a fully undetectable backdoor with simple steps.☆76Updated 3 years ago
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆21Updated 4 years ago
- A solution to create obfuscated reverse shells for PowerShell.☆81Updated 3 years ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆277Updated 7 months ago
- A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing vari…☆90Updated 4 years ago
- Python based c2 server with a basic beacon server to route the traffic from dummy server to prevent attacker's ip from getting exposed☆25Updated 6 years ago
- A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS☆130Updated 4 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆321Updated last year
- Just some lists of Malware Configs☆172Updated 8 months ago
- Persistent Powershell backdoor tool {😈}☆120Updated last year
- Repo containing cracked red teaming tools.☆192Updated last month
- Fork from @rsmudge/armitage☆136Updated 2 years ago
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆168Updated 2 years ago