Zhuagenborn / Goasm-RATLinks
💻 A Windows console remote administration tool written in Go & Intel x86 Assembly. It supports remote shell and screenshot.(使用Go和Intel x86汇编开发的Windows终端远程管理工具,支持远程Shell和屏幕截图。)
☆80Updated last year
Alternatives and similar repositories for Goasm-RAT
Users that are interested in Goasm-RAT are comparing it to the libraries listed below
Sorting:
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆90Updated 3 months ago
- BitRat Source Code☆42Updated 5 years ago
- NanoCore rat stub source code☆39Updated 3 years ago
- Modern Cross-Platform Peer-to-Peer Botnet over TOR☆49Updated 3 years ago
- Manual Map Your Files, Bypass 100% Runtime.☆11Updated 3 years ago
- C# binary with embeded golang hack-browser-data☆99Updated 4 years ago
- A Golang shellcode loader that receives payloads via ICMP packets from a C2 server to bypass firewalls☆22Updated 2 years ago
- Golang packer that use process hollowing☆18Updated 3 years ago
- Windows shellcode encoding and encrypting tool☆20Updated 3 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆15Updated 2 years ago
- Using the Windows API to mess with Task Manager in GoLANG☆15Updated 4 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- Group 4 - C# Remote Administrator Tool☆11Updated 10 months ago
- Command line & PPID spoofing☆27Updated 2 years ago
- eXtensiable Malware Toolkit: Full Featured Golang C2 Framework with Awesome Features☆102Updated last week
- A stealthy C++ shellcode loader using anti-analysis checks, AES-256 decryption, and dynamic memory permissions to evade detection. Includ…☆20Updated 8 months ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆51Updated last year
- 🔎🪲 Malleable C2 profiles parser and assembler written in golang☆65Updated last year
- This tool reveals hidden desktops and investigate processes/threads utilizing hidden desktops☆146Updated 4 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21Updated 3 years ago
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆31Updated 3 years ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆83Updated 2 years ago
- A fast, lightweight botnet written in pure C.☆40Updated 4 years ago
- Use CMSTP.exe to bypass UAC.☆52Updated 3 years ago
- A rework of CMLuaUtil AutoElevated☆29Updated 3 years ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆58Updated 3 weeks ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆17Updated 6 years ago
- https://docs.qwqdanchun.com/☆27Updated 4 years ago
- CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day☆52Updated 3 years ago