SkarSys / SkarCrypter
Crypter/Stub/Downloader for payloads and malware, bypassing all AV and achiving a score of 0/60 detections on virus total
☆9Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for SkarCrypter
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆43Updated last year
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆9Updated 3 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆20Updated last year
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆12Updated 7 months ago
- Powerful Rat/Botnet written C/C++ and Rust works on Windows, Linux and Mac OS, Android and IOT Devices Central / P2P Architecture. (Proje…☆8Updated 3 months ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆16Updated 3 months ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆15Updated last year
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆25Updated last year
- PDF Icon File Type Spoofer☆12Updated 4 months ago
- Simple Shellcode Loader tool☆24Updated last year
- Create a malicious pip package (PoC)☆10Updated last year
- Windows shellcode encoding and encrypting tool☆20Updated 2 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆62Updated last year
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆61Updated 2 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆27Updated 2 years ago
- Cerez 😈 LD_PRELOAD rootkit☆22Updated last year
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆20Updated 4 months ago
- CHAOS RAT web panel path RCE PoC☆29Updated 6 months ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆40Updated 6 months ago
- LNK-Dropper Builder☆16Updated last month
- Go ransomware utilising ChaCha20 and ECIES encryption.☆54Updated last month
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆13Updated last year
- NanoCore rat stub source code☆34Updated 2 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 3 years ago