S12cybersecurity / ShadowByte-Botnet
Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS
☆44Updated last year
Alternatives and similar repositories for ShadowByte-Botnet:
Users that are interested in ShadowByte-Botnet are comparing it to the libraries listed below
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆25Updated 2 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆88Updated last year
- User Mode Windows Rootkit☆55Updated last year
- Remote administration tool with native client☆33Updated last year
- Windows shellcode encoding and encrypting tool☆21Updated 2 years ago
- Crypter/Stub/Downloader for payloads and malware, bypassing all AV and achiving a score of 0/60 detections on virus total☆9Updated 10 months ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆21Updated 2 years ago
- NanoCore rat stub source code☆34Updated 2 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆64Updated 2 years ago
- A rework of CMLuaUtil AutoElevated☆23Updated 2 years ago
- Create a malicious pip package (PoC)☆10Updated last year
- CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day☆48Updated 3 years ago
- PowerShell Obfuscator. A PowerShell script anti-virus evasion tool☆72Updated 3 months ago
- 「🛡️」AVs/EDRs Evasion tool☆93Updated 2 months ago
- Crossplatform tool for inject shellcode into .exe and .dll binaries (x86 and x64)☆57Updated 9 months ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆81Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆41Updated 9 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆29Updated 2 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆66Updated last year
- PDF Icon File Type Spoofer☆13Updated 7 months ago
- Akame is an open-source, UD shellcode loader written in C++17.☆19Updated 7 months ago
- Simple Powershell Http shell With WEB UI☆70Updated 2 months ago
- ✔A script that turns off Windows Defender☆23Updated 2 years ago
- https://docs.qwqdanchun.com/☆27Updated 3 years ago
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆58Updated last year
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrity☆32Updated 2 years ago
- Fud Runpe Av Evasion / All Av Bypass☆32Updated last year
- Making Shellcode fully undetectable using uuid☆23Updated 3 years ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆41Updated 9 months ago