Ephrimgnanam / Cute-RATsLinks
This is a collection of RATs for educational purposes
☆51Updated 2 months ago
Alternatives and similar repositories for Cute-RATs
Users that are interested in Cute-RATs are comparing it to the libraries listed below
Sorting:
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆61Updated 2 months ago
- ☆71Updated 9 months ago
- ☆161Updated 8 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆104Updated 5 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆206Updated last week
- This is a collection of Worms for educational purposes☆33Updated 3 months ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆129Updated 3 months ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆133Updated 5 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆72Updated last year
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆57Updated last month
- [ARCHIVED] Early work on Benthic (Windows Kernel Rootkit).☆56Updated 2 months ago
- ☆157Updated 4 months ago
- Tool designed to exfiltrate OneDrive Business OCR Data☆123Updated 9 months ago
- 🧞♂️ malware analysis☆37Updated last year
- Python tool to check rootkits in Windows kernel☆201Updated 2 months ago
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆250Updated last month
- ☆152Updated 6 months ago
- Live malware samples and database, daily update.☆27Updated 6 months ago
- Source code for complete MALicious softWARE books I & II☆55Updated 3 weeks ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆159Updated 2 years ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆136Updated last year
- ☆41Updated last year
- The different ways to dump lsass☆195Updated 2 months ago
- Obex – Blocking unwanted DLLs in user mode☆260Updated last month
- kernel callback removal (Bypassing EDR Detections)☆197Updated 7 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆162Updated 9 months ago
- Generate an Alphabetical Polymorphic Shellcode☆130Updated 2 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆291Updated 2 weeks ago
- Collection of codes focused on Linux rootkits☆183Updated 2 weeks ago
- ⚠️ Malware Development training ⚠️☆38Updated 8 months ago