S12cybersecurity / RatInjectLinks
Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys
☆31Updated 2 years ago
Alternatives and similar repositories for RatInject
Users that are interested in RatInject are comparing it to the libraries listed below
Sorting:
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆55Updated 2 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆92Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantation☆71Updated last year
- PDF Icon File Type Spoofer☆16Updated last year
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆18Updated 2 years ago
- Malware Libraries focused in help Malware Development☆24Updated 2 years ago
- Malicious powershell scripts loader designed to avoid detection.☆51Updated 2 years ago
- A C2 framework built for my bachelors thesis☆56Updated 10 months ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆66Updated 3 years ago
- Multi-component Remote Access Trojan: C++ client (victim), C# server, and Angular frontend.☆31Updated 4 months ago
- Simple Shellcode Loader tool☆26Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆43Updated last year
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆25Updated 4 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆84Updated last year
- HVNC hidden remote VNC desktop with filemanager and backconnect☆43Updated 8 months ago
- A command and control framework.☆54Updated 8 months ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- Null-free shellcode for TCP reverse shell on Windows x64☆58Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM☆60Updated 2 years ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆61Updated last year
- AMSI Bypass for powershell☆30Updated 3 years ago
- Bypass Malware Sandbox Evasion Ram check☆138Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetM…☆40Updated last year
- Bypass Windows Defender with C++ .DLL Payload File - Meterpreter Reverse Shell☆44Updated 2 years ago
- A launcher to load a DLL with xored cobalt strike shellcode executed in memory through process hollowing technique☆28Updated 2 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆54Updated 2 years ago
- Small project to facilitate creation of .lnk payloads☆73Updated 2 years ago