Ephrimgnanam / Cute-RATsLinks
This is a collection of RATs for educational purposes
☆54Updated 4 months ago
Alternatives and similar repositories for Cute-RATs
Users that are interested in Cute-RATs are comparing it to the libraries listed below
Sorting:
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆65Updated last month
- ☆164Updated 9 months ago
- ☆71Updated 11 months ago
- This is a collection of Worms for educational purposes☆33Updated 5 months ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆168Updated 4 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆121Updated 7 months ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆133Updated 7 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆78Updated last year
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆261Updated 3 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆212Updated 2 months ago
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆29Updated 2 years ago
- ☆43Updated last year
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆45Updated last year
- [ARCHIVED] Early work on Benthic (Windows Kernel Rootkit).☆56Updated 4 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆57Updated 3 months ago
- ☆157Updated 8 months ago
- 🧞♂️ malware analysis☆36Updated last year
- This is practice VM for malware development☆170Updated last month
- ⚠️ Malware Development training ⚠️☆40Updated 10 months ago
- Tool designed to exfiltrate OneDrive Business OCR Data☆124Updated 11 months ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆138Updated 2 years ago
- Obex – Blocking unwanted DLLs in user mode☆277Updated 3 months ago
- Collection of codes focused on Linux rootkits☆188Updated 2 months ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆164Updated 2 years ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆96Updated 10 months ago
- RunPE implementation with multiple evasive techniques☆262Updated 3 months ago
- Python tool to check rootkits in Windows kernel☆204Updated 4 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆169Updated 11 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆90Updated 8 months ago
- Generate an Alphabetical Polymorphic Shellcode☆133Updated 4 months ago