Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit for ethical hackers. we begin with delivery methods, anti-virus evastion and continue on to local acceleration of privileges in order to get a privileged persistent on the target machine. in this Repo we will tr…
☆30Dec 14, 2018Updated 7 years ago
Alternatives and similar repositories for Rats
Users that are interested in Rats are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- Post-explotation Hacks☆14Jan 6, 2019Updated 7 years ago
- ☆11Mar 11, 2015Updated 11 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- ☆14Jun 27, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆10Sep 29, 2019Updated 6 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 9 years ago
- hypervisor in windows device driver by intel vt☆14Aug 25, 2018Updated 7 years ago
- ☆21May 10, 2017Updated 8 years ago
- .net based packer/obfuscator with apc based pe injection☆15Mar 23, 2016Updated 10 years ago
- ShellcodeVM☆15Jun 20, 2016Updated 9 years ago
- [Not work] Deobfuscate obfuscated binaries!☆11Dec 16, 2016Updated 9 years ago
- Class implementation of PowerLoader injection technique☆32Dec 23, 2016Updated 9 years ago
- ☆13Aug 12, 2015Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆14Jan 10, 2017Updated 9 years ago
- Windows PE file debugger☆11Aug 30, 2017Updated 8 years ago
- PE Infector/Cryptor source code☆16Apr 30, 2017Updated 8 years ago
- A library of utility classes for leveraging the Registered i/o api present in Microsoft Windows Server 2012, great for HFT or low latency…☆19Oct 8, 2012Updated 13 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- windows kernel File redirection☆20Sep 21, 2014Updated 11 years ago
- ☆24Nov 17, 2017Updated 8 years ago
- PE32 binary + W32 payload☆11Jul 23, 2017Updated 8 years ago
- GCC-like msvc/cl wrapper for "Bash on Windows"☆17Nov 16, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Plog - A simple and powerful keylogger !☆11Jun 28, 2018Updated 7 years ago
- C# AV bypass jank☆35Feb 9, 2021Updated 5 years ago
- Low-level MS Windows registry files analysis tools☆19May 5, 2016Updated 9 years ago
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆65Nov 4, 2012Updated 13 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Mar 31, 2014Updated 11 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- Assembly code to use for Windows kernel shellcode to edit winlogon.exe ACL☆13Mar 6, 2017Updated 9 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- profiling tool for analysising the games, get all the characteristic by hook d3d☆18Oct 10, 2014Updated 11 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Mar 19, 2022Updated 4 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Decompile an x86 exe, and read PE infos.☆19Sep 29, 2018Updated 7 years ago