Isiaon / PitraixLinks
Modern Cross-Platform Peer-to-Peer Botnet over TOR
☆49Updated 3 years ago
Alternatives and similar repositories for Pitraix
Users that are interested in Pitraix are comparing it to the libraries listed below
Sorting:
- A fast, lightweight botnet written in pure C.☆40Updated 4 years ago
- Decentralised P2P botnet using toxcore.☆179Updated 3 years ago
- Koadic C3 COM Command & Control - JScript RAT☆44Updated 8 years ago
- enemy SSH Telnet IoT botnet☆60Updated 3 years ago
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆38Updated 3 years ago
- IRC botnet, that's mainly used to launch denial-of-service attacks.☆28Updated last year
- UNFINISHED Botnet using a Go and Bootstrap Based C2, Support for Windows, Linux and Android Clients.☆101Updated 3 years ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆57Updated last week
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆92Updated 2 months ago
- HVNC hidden remote VNC desktop with filemanager and backconnect☆44Updated 11 months ago
- ☆37Updated 3 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆180Updated 3 years ago
- Antivirus Signature Search Toolkit☆82Updated 2 years ago
- NanoCore rat stub source code☆39Updated 3 years ago
- Cross-platform RAT, written in C☆88Updated 3 years ago
- eXtensiable Malware Toolkit: Full Featured Golang C2 Framework with Awesome Features☆102Updated 4 months ago
- cross-platform C2 framework in python 2☆39Updated 3 years ago
- Triple OS Malware development framework [ MacOS, Linux & Windows ]☆18Updated last year
- Multi-threaded, multi-os/platform (Linux/Windows) c2 server and Windows reverse TCP shell client both written in C.☆121Updated 3 years ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆107Updated 5 years ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆26Updated 7 months ago
- execute a PE in the address space of another PE aka process hollowing☆60Updated 4 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- UAdmin Phishlets for common sites☆15Updated 5 months ago
- ☆17Updated 2 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆93Updated 4 years ago
- A Golang shellcode loader that receives payloads via ICMP packets from a C2 server to bypass firewalls☆22Updated 2 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆66Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21Updated 3 years ago