S12cybersecurity / ShadowByte-BotnetLinks
Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS
☆60Updated 2 months ago
Alternatives and similar repositories for ShadowByte-Botnet
Users that are interested in ShadowByte-Botnet are comparing it to the libraries listed below
Sorting:
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆32Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆89Updated 4 months ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆23Updated 3 years ago
- 「🛡️」AVs/EDRs Evasion tool☆103Updated last year
- NanoCore rat stub source code☆38Updated 3 years ago
- HVNC hidden remote VNC desktop with filemanager and backconnect☆44Updated last year
- Simple Powershell Http shell With WEB UI☆74Updated 10 months ago
- A fast, lightweight botnet written in pure C.☆41Updated 4 years ago
- PDF Icon File Type Spoofer☆17Updated last year
- Remote administration tool with native client☆44Updated 8 months ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆28Updated 9 months ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆112Updated 4 months ago
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆41Updated 3 years ago
- Bypass Malware Sandbox Evasion Ram check☆141Updated 3 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- User Mode Windows Rootkit☆70Updated 2 years ago
- BitRat Source Code☆42Updated 5 years ago
- Koadic C3 COM Command & Control - JScript RAT☆49Updated 8 years ago
- PowerShell Obfuscator. A PowerShell script anti-virus evasion tool☆79Updated last year
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 3 years ago
- Simple Ransoware to attack Windows 🌟☆24Updated 2 years ago
- CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day☆52Updated 3 years ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆109Updated 5 years ago
- Antivirus Signature Search Toolkit☆81Updated 2 years ago
- A rework of CMLuaUtil AutoElevated☆29Updated 3 years ago
- A Remote Administration Tool (RAT) for Windows written in C++ with a fancy C.L.I.☆61Updated 2 years ago
- Multi-component Remote Access Trojan: C++ client (victim), C# server, and Angular frontend.☆47Updated 9 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆72Updated 2 years ago
- Windows shellcode encoding and encrypting tool☆20Updated 3 years ago
- Google Chrome Cookies Stealer. Steals Chrome cookies☆47Updated 2 years ago