Ephrimgnanam / Cute-RATsLinks
This is a collection of RATs for educational purposes
☆58Updated 5 months ago
Alternatives and similar repositories for Cute-RATs
Users that are interested in Cute-RATs are comparing it to the libraries listed below
Sorting:
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆68Updated 2 months ago
- ☆72Updated last year
- ☆164Updated 10 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆124Updated last month
- This is practice VM for malware development☆179Updated 2 months ago
- Live malware samples and database, daily update.☆31Updated 9 months ago
- 🧞♂️ malware analysis☆38Updated last year
- ☆156Updated 9 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆83Updated last year
- This is a collection of Worms for educational purposes☆34Updated 6 months ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆176Updated 5 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆215Updated 3 months ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆138Updated 8 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆59Updated 4 months ago
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆29Updated 2 years ago
- ⚠️ Malware Development training ⚠️☆40Updated 11 months ago
- ☆44Updated last year
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆260Updated 4 months ago
- ☆163Updated 7 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆167Updated last year
- Tool designed to exfiltrate OneDrive Business OCR Data☆125Updated last year
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆166Updated 2 years ago
- ☆152Updated 3 months ago
- The different ways to dump lsass☆206Updated 5 months ago
- A living guide to lesser-known and evasive Windows API abuses used in malware, with practical reverse engineering notes, YARA detections,…☆92Updated 3 months ago
- Source code for complete MALicious softWARE books I & II☆78Updated 3 months ago
- Python tool to check rootkits in Windows kernel☆206Updated 5 months ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆137Updated 2 years ago
- Obex – Blocking unwanted DLLs in user mode☆279Updated 4 months ago
- ☆122Updated 3 weeks ago