Isiaon / PitraixLinks
Modern Cross-Platform Peer-to-Peer Botnet over TOR
☆49Updated 3 years ago
Alternatives and similar repositories for Pitraix
Users that are interested in Pitraix are comparing it to the libraries listed below
Sorting:
- A fast, lightweight botnet written in pure C.☆40Updated 4 years ago
- Decentralised P2P botnet using toxcore.☆179Updated 3 years ago
- HVNC hidden remote VNC desktop with filemanager and backconnect☆44Updated 10 months ago
- enemy SSH Telnet IoT botnet☆60Updated 3 years ago
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆38Updated 3 years ago
- Cross-platform RAT, written in C☆88Updated 3 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆180Updated 2 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 3 years ago
- Koadic C3 COM Command & Control - JScript RAT☆44Updated 8 years ago
- IRC botnet, that's mainly used to launch denial-of-service attacks.☆28Updated last year
- UNFINISHED Botnet using a Go and Bootstrap Based C2, Support for Windows, Linux and Android Clients.☆101Updated 3 years ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆107Updated 5 years ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆57Updated 2 months ago
- NanoCore rat stub source code☆39Updated 3 years ago
- ☆17Updated 2 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆91Updated 2 months ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆66Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆20Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆37Updated 3 years ago
- Triple OS Malware development framework [ MacOS, Linux & Windows ]☆17Updated 11 months ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆26Updated 6 months ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- Create a powershell malware loader to run C#.cs code on runtime☆67Updated 6 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆95Updated 4 years ago
- A Hidden and Undetectable Remote Access Tool written in C++ and Server in Python3.☆66Updated last year
- A C2 project that controls a self-propagating MS17-010 worm.☆73Updated 4 years ago
- Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.☆63Updated 2 months ago
- cross-platform C2 framework in python 2☆39Updated 3 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆16Updated 3 years ago
- This script make any windows compatible with RDP connection☆21Updated 3 months ago