MikeZeDev / NanocoreDecoder
Decrypt Nanocore RAT configuration
☆10Updated 8 years ago
Alternatives and similar repositories for NanocoreDecoder:
Users that are interested in NanocoreDecoder are comparing it to the libraries listed below
- ZeroRemote Trojan SRC Extract☆19Updated 8 years ago
- Word Macro Virus that has a Powershell based Download & Execute Payload☆22Updated 8 years ago
- Binds two files together and updates the stub accordingly. The stub will then drop and execute both files.☆15Updated 8 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆29Updated 6 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆32Updated 7 years ago
- HTTP BOTNET☆7Updated last year
- My public exploit collection.☆32Updated 6 years ago
- Power Loader botnet☆39Updated 10 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 3 years ago
- Virus RAT v8.0 Beta☆22Updated 8 years ago
- Alina Spark - Point of Sales Trojan☆46Updated 10 years ago
- Simple protector to show how to run a payload without dropping it using RunPE Technique☆35Updated 7 years ago
- Disabling Windows Defender & downloading payload☆20Updated 4 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆24Updated 6 years ago
- Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.☆17Updated 8 years ago
- Shortcut Downloader☆11Updated 8 years ago
- Personal collection of Remote Administration Tool sources. Dedicated for Ax0nes Forum at Ax0nes.com for education purpose☆77Updated 7 years ago
- Malicious Software SRC Extract☆72Updated 8 years ago
- MS Word MS WordPad via IE VBS Engine RCE☆7Updated 6 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆71Updated 5 years ago
- Simple Remote Access Trojan☆21Updated 8 years ago
- The payload will search for specific files in desktop then upload them as *zip to your web server☆34Updated 5 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆14Updated 5 years ago
- UIAccess UAC Bypass using token duplication and keyboard events☆27Updated 5 years ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Updated 4 years ago
- $2100 .Exe to .Doc Exploit (Python)☆53Updated 4 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- Various Crypter Project☆51Updated 11 years ago
- The Grum Spam Bot☆20Updated 10 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago