Malwareman007 / SyncRATLinks
A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.
β19Updated last year
Alternatives and similar repositories for SyncRAT
Users that are interested in SyncRAT are comparing it to the libraries listed below
Sorting:
- This is a working variant of the Mirai IOT botnetβ13Updated 2 years ago
- web based c2 π΄ββ οΈβ13Updated 9 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It providesβ¦β13Updated last year
- β25Updated 2 years ago
- β9Updated last month
- A PowerShell script that simplifies life and therefore... phishing.β19Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionalityβ50Updated 2 years ago
- Malware Libraries focused in help Malware Developmentβ23Updated 2 years ago
- MacroExploit use in excel sheetβ20Updated last year
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , β¦β28Updated 2 years ago
- Trojan written in C++ for Windowsβ18Updated last year
- Automate Blind SQL Injection with Python.β22Updated 2 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.β32Updated last month
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.β47Updated last year
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch buildsβ21Updated last year
- β28Updated last year
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware Asβ¦β35Updated 3 years ago
- Generate FUD Droppers that are undetectable by popular AV'sβ31Updated last year
- Modular framework to exploit UPS devicesβ63Updated 2 years ago
- RegStrike is a .reg payload generatorβ58Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.β35Updated 2 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORKβ14Updated last year
- A C2 framework built for my bachelors thesisβ55Updated 7 months ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defenderβ22Updated 2 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conductβ¦β25Updated last year
- An offensive security framework for writing payloadsβ17Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client aβ¦β76Updated last year
- β35Updated last year
- AMSI Bypass for powershellβ30Updated 3 years ago
- VLAN attacks toolkitβ14Updated 2 years ago