Isiaon / PitraixLinks
Modern Cross-Platform Peer-to-Peer Botnet over TOR
☆47Updated 2 years ago
Alternatives and similar repositories for Pitraix
Users that are interested in Pitraix are comparing it to the libraries listed below
Sorting:
- A fast, lightweight botnet written in pure C.☆37Updated 3 years ago
- Source Code for BlueEagle jRAT & Release ☄ 📏☣✒Blue Eagle jRAT is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT]…☆1Updated 2 years ago
- Decentralised P2P botnet using toxcore.☆175Updated 2 years ago
- Koadic C3 COM Command & Control - JScript RAT☆45Updated 7 years ago
- ☆37Updated 3 years ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆55Updated 2 years ago
- UNFINISHED Botnet using a Go and Bootstrap Based C2, Support for Windows, Linux and Android Clients.☆98Updated 2 years ago
- enemy SSH Telnet IoT botnet☆61Updated 3 years ago
- Triple OS Malware development framework [ MacOS, Linux & Windows ]☆15Updated 7 months ago
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆35Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆90Updated last year
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- cross-platform C2 framework in python 2☆41Updated 3 years ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆25Updated 2 months ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 2 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆182Updated 2 years ago
- A Build Your Own Botnet Project Build For People Who Wanna Hijack Peoples Computers And Control Them With Over 300 Features!☆11Updated 6 years ago
- HVNC hidden remote VNC desktop with filemanager and backconnect☆42Updated 6 months ago
- NanoCore rat stub source code☆38Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- IRC botnet, that's mainly used to launch denial-of-service attacks.☆28Updated last year
- A C2 project that controls a self-propagating MS17-010 worm.☆72Updated 4 years ago
- Multi-threaded, multi-os/platform (Linux/Windows) c2 server and Windows reverse TCP shell client both written in C.☆121Updated 3 years ago
- BitRat Source Code☆42Updated 4 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆98Updated 4 years ago
- eXtensiable Malware Toolkit: Full Featured Golang C2 Framework with Awesome Features☆99Updated 10 months ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆20Updated 3 years ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆31Updated 2 years ago
- Create a malicious pip package (PoC)☆12Updated last year
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆98Updated 5 years ago