Cy-Shadow / Ultimate-Rat-CollectionLinks
☆14Updated 7 months ago
Alternatives and similar repositories for Ultimate-Rat-Collection
Users that are interested in Ultimate-Rat-Collection are comparing it to the libraries listed below
Sorting:
- Change hash for a signed pe☆16Updated last year
- A very weird RAT☆19Updated 2 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated last year
- NanoCore rat stub source code☆38Updated 3 years ago
- ☆25Updated 7 months ago
- A collection of cpuid instruction implementations for anti-vm purposes.☆11Updated last year
- Collection of Win32 with C++/Assembly for Hooking, Patch and Reversing PE file☆12Updated 2 years ago
- Listing UDP connections with remote address without sniffing.☆29Updated last year
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆55Updated 3 months ago
- c# Orcus RAT i18n 添加中文-zh-cn; 移除授权鉴定☆33Updated 3 years ago
- Detour hooking IRQ1 ISR through IDT (Interrupt Descriptor Table)☆19Updated 2 years ago
- BitRat Source Code☆42Updated 4 years ago
- ☆20Updated last year
- Hardware Spoofing & VirtualBox-Hardening x64 Bootkit☆16Updated 2 years ago
- An attempt at reversing WindowsDefender☆20Updated 8 months ago
- the Open Source and Pure C++ Packer for eXecutables☆21Updated 2 years ago
- Using Thread Description To Hide Shellcodes☆14Updated 2 years ago
- Multi-component Remote Access Trojan: C++ client (victim), C# server, and Angular frontend.☆17Updated last month
- Remote administration tool with native client☆38Updated 2 weeks ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- Akame is an open-source, shellcode loader written in C++17☆20Updated 2 months ago
- ☆27Updated 2 years ago
- 💻 Windows 10 Kernel-mode rootkit☆31Updated 2 years ago
- Perform Thread Hijacking Shellcode Injection without OpenProcess and OpenThread mapping all the free handles in memory☆12Updated 10 months ago
- Phantom DLL Hollowing method implemented in modmap☆17Updated 3 years ago
- PoC for the Untrusted Pointer Dereference in the appid.sys driver☆16Updated last year
- Dynamically generated obfuscated jumps and/or function calls☆35Updated 2 years ago
- ☆11Updated 3 years ago
- 关闭恶意驱动的文件和注册表保护☆12Updated 2 years ago
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆17Updated 2 years ago