EvilBytecode / Keylogger
Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.
☆19Updated 3 months ago
Related projects: ⓘ
- Go ransomware utilising ChaCha20 and ECIES encryption.☆52Updated last month
- A malicous Golang Package☆10Updated 2 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆49Updated last year
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆10Updated 2 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆45Updated 2 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆34Updated 3 months ago
- A C2 framework built for my bachelors thesis☆51Updated 2 months ago
- This is a working variant of the Mirai IOT botnet☆13Updated last year
- Parent Process ID Spoofing, coded in CGo.☆21Updated 2 months ago
- HeadHunter Command and Control (C2)☆18Updated 2 weeks ago
- Ransomware written in go, encrypt - decrypt.☆15Updated 2 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆41Updated last year
- Unhook Ntdll.dll, Go & C++.☆11Updated 2 months ago
- RegStrike is a .reg payload generator☆55Updated last year
- Dump Windows SAM hashes☆40Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆51Updated 7 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆77Updated 9 months ago
- VirusTotal Stealer is a DATA Exfiltration tool that exfitrate office documents and tunnel them over VirusTotal API to the Team Server☆62Updated 11 months ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆63Updated 4 months ago
- This is a simulation of attack by the Cozy Bear group (APT-29) targeting diplomatic missions☆20Updated 3 months ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆11Updated 10 months ago
- PowerShell script to generate ShellCode in various formats☆22Updated 2 weeks ago
- C++ Code to perform a MiniDump of lsass.exe☆33Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆38Updated 3 months ago
- ☆27Updated this week
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆31Updated 10 months ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆68Updated 7 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆51Updated last month
- exfiltration/infiltration toolkit☆23Updated 9 months ago
- ☆55Updated this week