Ephrimgnanam / Cute-RATsLinks
This is a collection of RATs for educational purposes
☆44Updated this week
Alternatives and similar repositories for Cute-RATs
Users that are interested in Cute-RATs are comparing it to the libraries listed below
Sorting:
- ☆67Updated 5 months ago
- ☆157Updated 4 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆50Updated 3 months ago
- This is a collection of Worms for educational purposes☆27Updated this week
- A robust, multiprocessing-capable, multi-family RAT config parser/config extractor for AsyncRAT, DcRAT, VenomRAT, QuasarRAT, XWorm, Xeno …☆47Updated last month
- BSides Prishtina 2024 Malware Development and Persistence workshop☆88Updated last month
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆61Updated 10 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆55Updated 3 months ago
- ☆150Updated 2 months ago
- ☆115Updated this week
- Vibe Malware Triage - MCP server for static PE analysis.☆63Updated 2 months ago
- Chiron Unpacker, developed by the Malwation MTR Team, is an Unpacker for Packers using the Assembly.Load function.☆19Updated 9 months ago
- Collection of codes focused on Linux rootkits☆133Updated last month
- Early work on Benthic Windows Kernel Rootkit☆55Updated last week
- Tool designed to exfiltrate OneDrive Business OCR Data☆112Updated 5 months ago
- Python tool to check rootkits in Windows kernel☆197Updated 4 months ago
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆28Updated 2 years ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆37Updated 5 months ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆66Updated 2 months ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆135Updated last year
- ☆85Updated 2 years ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆39Updated 2 weeks ago
- ☆140Updated last month
- ☆107Updated 8 months ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆123Updated last month
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆70Updated 5 months ago
- ☆37Updated last year
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆179Updated 4 months ago
- Analyse MSI files for vulnerabilities☆137Updated 10 months ago
- Configuration Extractors for Malware☆108Updated 2 months ago