Saurik remote control software opensource, X30 is now available.
☆37Oct 17, 2022Updated 3 years ago
Alternatives and similar repositories for RemoteControl-X3
Users that are interested in RemoteControl-X3 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆20Sep 12, 2019Updated 6 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- A program that turn anyfile into C++ Source File (char linear table)☆15Feb 23, 2019Updated 7 years ago
- ☆11Apr 23, 2019Updated 6 years ago
- PoC for DEF CON 26: Playing Malware Injection with Exploit thoughts☆25Aug 17, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- 加载内存当中的DLL文件☆83Aug 1, 2018Updated 7 years ago
- SKSocks, for proxy, firewall penetration, data encryption and speeding up internet accessing.☆68Jun 12, 2024Updated last year
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- Software Protector☆20Aug 16, 2020Updated 5 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Dec 20, 2019Updated 6 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20May 24, 2019Updated 6 years ago
- ☆37May 9, 2019Updated 6 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- PoC code from blog☆16Mar 10, 2020Updated 6 years ago
- Some interesting code☆18Jan 16, 2015Updated 11 years ago
- The project uses popular anti-virus protection bypass techniques☆12Nov 26, 2018Updated 7 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Disabling Windows Defender & downloading payload☆20Jul 28, 2020Updated 5 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆70May 9, 2019Updated 6 years ago
- medium-rare☆28Nov 21, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- ☆65Nov 12, 2022Updated 3 years ago
- ☆17Feb 29, 2020Updated 6 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆16Jun 3, 2019Updated 6 years ago
- map driver to memory☆26Aug 26, 2018Updated 7 years ago
- PE Infector/Cryptor source code☆16Apr 30, 2017Updated 8 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆29Aug 5, 2019Updated 6 years ago
- Class implementation of PowerLoader injection technique☆32Dec 23, 2016Updated 9 years ago
- DarkRats Standalone HVNC☆26May 20, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆19Jul 20, 2015Updated 10 years ago
- a simple reverse connected bot in golang.☆18Jun 14, 2022Updated 3 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- This project has been moved from a private repository.☆11May 4, 2018Updated 7 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Feb 22, 2020Updated 6 years ago
- An example of PE hollowing injection technique☆26Jun 28, 2019Updated 6 years ago