S12cybersecurity / ShadowByte-BotnetLinks
Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS
☆53Updated 2 years ago
Alternatives and similar repositories for ShadowByte-Botnet
Users that are interested in ShadowByte-Botnet are comparing it to the libraries listed below
Sorting:
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆30Updated 2 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆90Updated last year
- Remote administration tool with native client☆38Updated 2 weeks ago
- Crypter/Stub/Downloader for payloads and malware, bypassing all AV and achiving a score of 0/60 detections on virus total☆9Updated last year
- Simple Powershell Http shell With WEB UI☆71Updated 2 months ago
- User Mode Windows Rootkit☆62Updated last year
- PDF Icon File Type Spoofer☆15Updated 10 months ago
- Windows shellcode encoding and encrypting tool☆21Updated 3 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆64Updated 3 years ago
- NanoCore rat stub source code☆38Updated 3 years ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆25Updated last month
- Classic Process Injection with Memory Evasion Techniques implemantation☆70Updated last year
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆84Updated 2 years ago
- A keygen for Specter Insight C2☆32Updated 3 months ago
- 「🛡️」AVs/EDRs Evasion tool☆98Updated 5 months ago
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆34Updated 2 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 2 years ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆31Updated last week
- HVNC hidden remote VNC desktop with filemanager and backconnect☆41Updated 5 months ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated last year
- A rework of CMLuaUtil AutoElevated☆25Updated 2 years ago
- Bypassing Major EDR's with staged shellcode, custom getmodulehandleW and getprocaddress, veh syscalls & more.☆19Updated last month
- PowerShell Obfuscator. A PowerShell script anti-virus evasion tool☆73Updated 6 months ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- Akame is an open-source, shellcode loader written in C++17☆20Updated 2 months ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆45Updated last year
- A fast, lightweight botnet written in pure C.☆36Updated 3 years ago
- BitRat Source Code☆42Updated 4 years ago
- CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day☆50Updated 3 years ago