Isiaon / PitraixLinks
Modern Cross-Platform Peer-to-Peer Botnet over TOR
☆47Updated 2 years ago
Alternatives and similar repositories for Pitraix
Users that are interested in Pitraix are comparing it to the libraries listed below
Sorting:
- A fast, lightweight botnet written in pure C.☆37Updated 3 years ago
- Decentralised P2P botnet using toxcore.☆176Updated 2 years ago
- HVNC hidden remote VNC desktop with filemanager and backconnect☆42Updated 7 months ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆55Updated 2 years ago
- Koadic C3 COM Command & Control - JScript RAT☆45Updated 8 years ago
- ☆37Updated 3 years ago
- NanoCore rat stub source code☆38Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆90Updated last year
- eXtensiable Malware Toolkit: Full Featured Golang C2 Framework with Awesome Features☆100Updated last week
- 🚧 C# UAC Bypass technique using mock directories 🚧☆27Updated 3 years ago
- enemy SSH Telnet IoT botnet☆61Updated 3 years ago
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆37Updated 3 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- Source Code for BlueEagle jRAT & Release ☄ 📏☣✒Blue Eagle jRAT is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT]…☆1Updated 2 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆180Updated 2 years ago
- UNFINISHED Botnet using a Go and Bootstrap Based C2, Support for Windows, Linux and Android Clients.☆99Updated 2 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- BitRat Source Code☆42Updated 4 years ago
- UAdmin Phishlets for common sites☆14Updated last month
- cross-platform C2 framework in python 2☆41Updated 3 years ago
- Cross-platform RAT, written in C☆86Updated 2 years ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆98Updated 5 years ago
- All Our Products☆12Updated 4 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆77Updated 5 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 3 years ago
- A Golang shellcode loader that receives payloads via ICMP packets from a C2 server to bypass firewalls☆18Updated 2 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆20Updated 3 years ago
- IRC botnet, that's mainly used to launch denial-of-service attacks.☆28Updated last year