Tomiwa-Ot / telegram-c2
Control a system remotely via telegram
☆32Updated 3 months ago
Alternatives and similar repositories for telegram-c2:
Users that are interested in telegram-c2 are comparing it to the libraries listed below
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆21Updated 2 years ago
- Perform With Massive Wordpress Enumeration☆12Updated last year
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated last year
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆67Updated 10 months ago
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆22Updated last year
- Teardroid v4 Botnet API☆61Updated last year
- This is power full BotNet☆41Updated last year
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆10Updated 5 months ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆102Updated last year
- A Remote Administration Tool (RAT) for Windows written in C++ with a fancy C.L.I.☆55Updated last year
- I present to you AsyncRAT improved version with a STUB which does not bug and which is undetectable via windows defender normally. I invi…☆15Updated 2 years ago
- ADR is a trojan that retrieves all information on the computer and all data stored in applications using chormuim. It recovers cookies, t…☆24Updated last year
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆14Updated last year
- A PowerShell script that simplifies life and therefore... phishing.☆17Updated 2 years ago
- A simple script to obfuscate batch(bat) code easily☆22Updated last year
- Android Keylogger and Trojan☆28Updated last year
- Pegasus Is A Tool Wich Has 9 Functions. Pegasus Uses Discord as C2.☆10Updated 2 years ago
- LNK-Dropper Builder☆19Updated 5 months ago
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆37Updated last year
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆23Updated last year
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆74Updated last year
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆13Updated last year
- A large collection of Troajn☆24Updated 2 years ago
- Clipboard poisoning attack.☆54Updated 4 years ago
- AndroMW - control your android device without internet☆30Updated last year
- BackdoorSim: An Educational into Remote Administration Tools☆102Updated last year
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆30Updated 4 months ago
- SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetr…☆15Updated 4 months ago
- Simple Powershell Http shell With WEB UI☆70Updated 2 months ago