Kracken256 / dash-shell-rootkitLinks
Dash rootkit. Linux Trojan Backdoor. (MALWARE)
☆10Updated 2 years ago
Alternatives and similar repositories for dash-shell-rootkit
Users that are interested in dash-shell-rootkit are comparing it to the libraries listed below
Sorting:
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- Trojan written in C++ for Windows☆18Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- ☆34Updated 2 years ago
- Red Team Operation's Defense Evasion Technique.☆53Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- Command-line tool to search for malware samples in various repositories☆11Updated 3 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated 2 years ago
- ☆19Updated 3 years ago
- Hellokitty Ransomware Source Code☆15Updated last year
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆27Updated 2 years ago
- Powerfull scripts to bypass windows defender☆9Updated 3 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆29Updated last year
- AMSI Bypass for powershell☆30Updated 3 years ago
- ☆17Updated 5 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- RegStrike is a .reg payload generator☆58Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆7Updated 3 years ago
- Conti Ransomware Source Code☆19Updated 3 years ago
- aggregated repo for all conferences and talks I am giving☆17Updated 3 years ago
- ☆14Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆38Updated 3 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated 2 years ago
- ☆27Updated 7 months ago
- Notes and IoCs of fresh malware☆58Updated 11 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆35Updated 2 months ago
- Defanger is a Notepad++ plugin that defangs/refangs malicious IOCs.☆25Updated 2 years ago