Isiaon / PitraixLinks
Modern Cross-Platform Peer-to-Peer Botnet over TOR
☆48Updated 3 years ago
Alternatives and similar repositories for Pitraix
Users that are interested in Pitraix are comparing it to the libraries listed below
Sorting:
- A fast, lightweight botnet written in pure C.☆38Updated 3 years ago
- Decentralised P2P botnet using toxcore.☆178Updated 2 years ago
- Koadic C3 COM Command & Control - JScript RAT☆44Updated 8 years ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆57Updated 3 weeks ago
- enemy SSH Telnet IoT botnet☆60Updated 3 years ago
- UNFINISHED Botnet using a Go and Bootstrap Based C2, Support for Windows, Linux and Android Clients.☆100Updated 3 years ago
- eXtensiable Malware Toolkit: Full Featured Golang C2 Framework with Awesome Features☆100Updated 2 months ago
- ☆37Updated 3 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 3 years ago
- Cross-platform RAT, written in C☆87Updated 2 years ago
- Antivirus Signature Search Toolkit☆82Updated 2 years ago
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆39Updated 3 years ago
- IRC botnet, that's mainly used to launch denial-of-service attacks.☆28Updated last year
- A C2 project that controls a self-propagating MS17-010 worm.☆74Updated 4 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆90Updated 3 weeks ago
- ☆17Updated 2 years ago
- HVNC hidden remote VNC desktop with filemanager and backconnect☆43Updated 9 months ago
- A windows backdoor that's use Telegram as a C2 server.☆14Updated last year
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆25Updated 5 months ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆20Updated 3 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆180Updated 2 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆66Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- NanoCore rat stub source code☆38Updated 3 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆106Updated 5 years ago
- Triple OS Malware development framework [ MacOS, Linux & Windows ]☆17Updated 10 months ago
- A Golang shellcode loader that receives payloads via ICMP packets from a C2 server to bypass firewalls☆21Updated 2 years ago
- UAdmin Phishlets for common sites☆14Updated 3 months ago
- execute a PE in the address space of another PE aka process hollowing☆59Updated 3 years ago