Zhuagenborn / Goasm-RATLinks
💻 A Windows console remote administration tool written in Go & Intel x86 Assembly. It supports remote shell and screenshot.(使用Go和Intel x86汇编开发的Windows终端远程管理工具,支持远程Shell和屏幕截图。)
☆78Updated last year
Alternatives and similar repositories for Goasm-RAT
Users that are interested in Goasm-RAT are comparing it to the libraries listed below
Sorting:
- NanoCore rat stub source code☆38Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆90Updated last year
- Windows shellcode encoding and encrypting tool☆21Updated 3 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- Group 4 - C# Remote Administrator Tool☆11Updated 4 months ago
- User Mode Windows Rootkit☆63Updated last year
- A major platforms RAT Tools .High scalability.Now support Windows/Linux/MacOS☆84Updated 3 years ago
- A keygen for Specter Insight C2☆32Updated 4 months ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 2 years ago
- Golang packer that use process hollowing☆18Updated 3 years ago
- Unhook DLL via cleaning the DLL 's .text section☆9Updated 3 years ago
- Akame is an open-source, shellcode loader written in C++17☆20Updated 2 months ago
- A Golang implant that uses Discord as a C2 team server☆66Updated 7 months ago
- BitRat Source Code☆42Updated 4 years ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆98Updated 5 years ago
- ✔A script that turns off Windows Defender☆23Updated 3 years ago
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrity☆32Updated 3 years ago
- ☆20Updated last year
- Using syscall to load shellcode, Evasion techniques☆27Updated 3 years ago
- A Golang shellcode loader that receives payloads via ICMP packets from a C2 server to bypass firewalls☆17Updated 2 years ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆55Updated 2 years ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆84Updated 2 years ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆31Updated 2 years ago
- Remote Access Tool written in C#☆41Updated this week
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆34Updated 3 years ago
- Bypass windows eventlogs & Sysmon☆18Updated 3 years ago
- Modern Cross-Platform Peer-to-Peer Botnet over TOR☆47Updated 2 years ago
- Indirect NT syscalls LSASS dumper.☆45Updated last year
- Bypassing Major EDR's with staged shellcode, custom getmodulehandleW and getprocaddress, veh syscalls & more.☆20Updated 2 months ago
- A rework of CMLuaUtil AutoElevated☆26Updated 2 years ago