De3vil / WinPersistenceLinks
Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender
☆22Updated 2 years ago
Alternatives and similar repositories for WinPersistence
Users that are interested in WinPersistence are comparing it to the libraries listed below
Sorting:
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆53Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- Simple Powershell Http shell With WEB UI☆71Updated 2 months ago
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- steal chrome saved passwords "undetectable"☆50Updated 3 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆64Updated 3 years ago
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆36Updated last year
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆40Updated 2 years ago
- CHAOS RAT web panel path RCE PoC☆28Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated last year
- Koadic C3 COM Command & Control - JScript RAT☆44Updated 7 years ago
- Undetectable payload for Windows 10 and 11☆39Updated 2 years ago
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆14Updated last year
- Crypter/Stub/Downloader for payloads and malware, bypassing all AV and achiving a score of 0/60 detections on virus total☆9Updated last year
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆30Updated 2 years ago
- Venom is a collaborative C2 framework used by Red Team operators. providing an interactive Web GUI written in Python and PowerShell.☆17Updated 2 years ago
- ☆25Updated 2 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated last year
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆90Updated last year
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated last year
- Simple Shellcode Loader tool☆26Updated last year
- OpenSSH 9.1 vulnerability mass scan and exploit☆8Updated 2 years ago
- Bypass Windows Defender with C++ .DLL Payload File - Meterpreter Reverse Shell☆41Updated 2 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated last year
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)☆32Updated 2 years ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆16Updated 4 years ago