Zhuagenborn / Goasm-RATLinks
💻 A Windows console remote administration tool written in Go & Intel x86 Assembly. It supports remote shell and screenshot.(使用Go和Intel x86汇编开发的Windows终端远程管理工具,支持远程Shell和屏幕截图。)
☆80Updated last year
Alternatives and similar repositories for Goasm-RAT
Users that are interested in Goasm-RAT are comparing it to the libraries listed below
Sorting:
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆89Updated 4 months ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆109Updated 5 years ago
- Modern Cross-Platform Peer-to-Peer Botnet over TOR☆47Updated 3 years ago
- Crossplatform tool for inject shellcode into .exe and .dll binaries (x86 and x64)☆75Updated last month
- BitRat Source Code☆42Updated 5 years ago
- NanoCore rat stub source code☆38Updated 3 years ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆59Updated 2 months ago
- User Mode Windows Rootkit☆69Updated 2 years ago
- A simple Botnet. 一个简单的僵尸网络Bot。☆21Updated 5 years ago
- A Golang shellcode loader that receives payloads via ICMP packets from a C2 server to bypass firewalls☆22Updated 2 years ago
- Windows shellcode encoding and encrypting tool☆20Updated 3 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 3 years ago
- Golang packer that use process hollowing☆19Updated 3 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- Antivirus Signature Search Toolkit☆81Updated 2 years ago
- A Golang implant that uses Discord as a C2 team server☆65Updated last year
- Using the Windows API to mess with Task Manager in GoLANG☆15Updated 4 years ago
- This tool reveals hidden desktops and investigate processes/threads utilizing hidden desktops☆148Updated 4 years ago
- 「🧊」Ring 3 Rootkit for Windows 10☆60Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21Updated 3 years ago
- CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day☆52Updated 3 years ago
- Remote administration tool with native client☆44Updated 8 months ago
- A rework of CMLuaUtil AutoElevated☆29Updated 3 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆15Updated 2 years ago
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆19Updated 3 years ago
- A command and control (C2) server☆58Updated last year
- eXtensiable Malware Toolkit: Full Featured Golang C2 Framework with Awesome Features☆103Updated last month
- 🔎🪲 Malleable C2 profiles parser and assembler written in golang☆65Updated last year
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆59Updated 2 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆70Updated last year