一个基于 Nostr 去中心的匿名远程控制工具 A decentralized anonymous remote control tool based on Nostr
☆21Apr 14, 2025Updated 10 months ago
Alternatives and similar repositories for nrat
Users that are interested in nrat are comparing it to the libraries listed below
Sorting:
- Thats it! An Open-Source Windows UEFI Rootkit☆28Jul 19, 2025Updated 7 months ago
- ☆36Feb 12, 2026Updated 3 weeks ago
- Telegram base free Rat☆12Apr 26, 2025Updated 10 months ago
- Dynamic Indirect Syscalls via JOP/ROP in Pure no_std, no_alloc, no dependency Rust☆43Aug 6, 2025Updated 7 months ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆27May 13, 2025Updated 9 months ago
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆36Apr 16, 2024Updated last year
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 7 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass ETW scanning by redirecting ETW calls to…☆45Jun 1, 2025Updated 9 months ago
- Guide on using the PPPwnGo GUI tool☆11Sep 26, 2024Updated last year
- kASLR bypass technique on Intel CPUs.☆32May 18, 2025Updated 9 months ago
- Generate Proxy DLLs in Rust☆48Updated this week
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 6 months ago
- Reverse proxy in rust, build on top of hyper☆12Nov 8, 2022Updated 3 years ago
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- A simple, fast UDP development framework based on gokcp☆33Jan 16, 2021Updated 5 years ago
- PoC exploit for the vulnerable (eb.sys or UnknownKiller.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆55Feb 27, 2026Updated last week
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).☆68Dec 17, 2025Updated 2 months ago
- Shellcode loader☆101Nov 24, 2024Updated last year
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆30Jul 12, 2021Updated 4 years ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 9 months ago
- || Activate Burp Suite Pro with Loader and Key-Generator ||☆47Jun 1, 2021Updated 4 years ago
- A buffer async queue☆11Sep 24, 2024Updated last year
- A high-fidelity x86_64 polymorphic mutation engine focused on instruction-level fragmentation and context preservation.☆111Jan 18, 2026Updated last month
- HDLBits-Solutions☆10May 27, 2022Updated 3 years ago
- Unnoficial solutions (still under construction) to Nielsen and Chuang's "Quantum Computation and Quantum Information" - 10th anniversary …☆19Feb 11, 2026Updated 3 weeks ago
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆115Jan 29, 2026Updated last month
- Patches the AmsiScan function in clr.dll allowing for unrestricted assembly loading in .NET☆51May 5, 2025Updated 10 months ago
- ATL.dll and WmiMgmt.msc UAC Bypass☆12Apr 26, 2025Updated 10 months ago
- ☆10May 18, 2025Updated 9 months ago
- An NPU-accelerated chatbot running via AnythingLLM☆17Jul 3, 2025Updated 8 months ago
- ☆13Mar 6, 2010Updated 16 years ago
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆200Apr 21, 2025Updated 10 months ago
- Utility for making crosschain transactions on the Wanchain network☆13Mar 18, 2019Updated 6 years ago
- pano date resolver stuff☆18Dec 3, 2025Updated 3 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆103Apr 27, 2025Updated 10 months ago
- kernel-mode DLL Injector☆127Apr 24, 2025Updated 10 months ago
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆64Apr 2, 2025Updated 11 months ago