Zhuagenborn / Goasm-RATLinks
💻 A Windows console remote administration tool written in Go & Intel x86 Assembly. It supports remote shell and screenshot.(使用Go和Intel x86汇编开发的Windows终端远程管理工具,支持远程Shell和屏幕截图。)
☆80Updated last year
Alternatives and similar repositories for Goasm-RAT
Users that are interested in Goasm-RAT are comparing it to the libraries listed below
Sorting:
- Modern Cross-Platform Peer-to-Peer Botnet over TOR☆47Updated 2 years ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆55Updated 2 years ago
- Group 4 - C# Remote Administrator Tool☆11Updated 6 months ago
- Manual Map Your Files, Bypass 100% Runtime.☆11Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆92Updated last year
- NanoCore rat stub source code☆38Updated 3 years ago
- Windows shellcode encoding and encrypting tool☆20Updated 3 years ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆105Updated 5 years ago
- Golang packer that use process hollowing☆18Updated 3 years ago
- BitRat Source Code☆42Updated 4 years ago
- A Golang shellcode loader that receives payloads via ICMP packets from a C2 server to bypass firewalls☆19Updated 2 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- A Golang implant that uses Discord as a C2 team server☆67Updated 9 months ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆27Updated 3 years ago
- Crossplatform tool for inject shellcode into .exe and .dll binaries (x86 and x64)☆70Updated last year
- eXtensiable Malware Toolkit: Full Featured Golang C2 Framework with Awesome Features☆99Updated last month
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- 🔎🪲 Malleable C2 profiles parser and assembler written in golang☆67Updated last year
- Koadic C3 COM Command & Control - JScript RAT☆45Updated 8 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆20Updated 3 years ago
- execute a PE in the address space of another PE aka process hollowing☆58Updated 3 years ago
- Using the Windows API to mess with Task Manager in GoLANG☆14Updated 3 years ago
- A rework of CMLuaUtil AutoElevated☆27Updated 2 years ago
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆37Updated 5 years ago
- Akame is an open-source, shellcode loader written in C++17☆19Updated 5 months ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day☆51Updated 3 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆16Updated 2 years ago
- Remote administration tool with native client☆40Updated 3 months ago
- C# binary with embeded golang hack-browser-data☆98Updated 3 years ago