NYAN-x-CAT / UAC-Escaper
Escalation / Bypass Windows UAC
☆109Updated 5 years ago
Alternatives and similar repositories for UAC-Escaper:
Users that are interested in UAC-Escaper are comparing it to the libraries listed below
- Revenge-RAT C# Stub - Fixed☆89Updated 5 years ago
- Simple Malware Downloader☆122Updated 5 years ago
- Download a payload and make it run from registry without droppng.☆105Updated 5 years ago
- Crypter made in C#. Nearly FUD. Detection rate 2/38☆51Updated 5 years ago
- JS Jscript - download file from url then run it☆59Updated 4 years ago
- Malware USB Spread | Example C#☆176Updated 5 years ago
- njRAT C# Stub - Fixed For PowerShell☆54Updated 5 years ago
- Simple example of how to remove all malwares from disk and registry.☆40Updated 5 years ago
- Create a powershell malware loader to run C#.cs code on runtime☆62Updated 5 years ago
- Hide malware behind a legit process C#☆118Updated 5 years ago
- Simple C# Keylogger (Keyboard Layout)☆63Updated 5 years ago
- Disable WD using VBS☆114Updated 2 years ago
- Changing values to bypass windows defender C#☆215Updated 5 years ago
- $2100 .Exe to .Doc Exploit (Python)☆53Updated 4 years ago
- Program for remote computer management with Telegram on native C++ - by B4DB4B3☆109Updated 3 years ago
- Simple Free Crypter for .NET Trojans like njRAT☆178Updated 4 years ago
- Detect virtual environment☆63Updated 5 years ago
- ☄ 📏☣✒Blue Eagle jRAT is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT] [Linux RAT] [MAC RAT] } which is fully p…☆1Updated 2 years ago
- using VBS to download and install a powershell malware☆39Updated 5 years ago
- Polymorph file protector☆43Updated 5 years ago
- Open-Source Remote Administration Tool for Windows. 100% FUD Without any Crypter☆167Updated 2 years ago
- Download a .NET payload and run it on memory☆68Updated 5 years ago
- Panel for the HTTP botnet UBoat - https://github.com/UBoat-Botnet/UBoat/☆109Updated 3 years ago
- DarkCrypter encrypts your files and generates undetectable payloads to evade all anti-virus vendors.☆22Updated 2 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆96Updated 3 years ago
- Remote Access Tool for Windows.☆84Updated 2 years ago
- Decrypt chromium based browsers passwords, cookies, credit cards, history, bookmarks. Version > 80 is supported.☆15Updated 4 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆71Updated 5 years ago
- An open-source, centralized HTTPS botnet☆44Updated 4 years ago
- Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUD☆132Updated 3 years ago