a7t0fwa7 / Pandora-Hvnc-Hidden-Browser-Real-Vnc-Working-Chromium-Edge-Opera-GxLinks
Hidden Features Full Hidden Access Hidden Desktop Hidden Browsers Hidden Cmd Clone Profile Hidden PowerShell Hidden Explorer Hidden Startup Hidden Applications
☆13Updated 2 years ago
Alternatives and similar repositories for Pandora-Hvnc-Hidden-Browser-Real-Vnc-Working-Chromium-Edge-Opera-Gx
Users that are interested in Pandora-Hvnc-Hidden-Browser-Real-Vnc-Working-Chromium-Edge-Opera-Gx are comparing it to the libraries listed below
Sorting:
- A Windows lightweight RAT written in C++☆9Updated 4 years ago
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Updated 3 years ago
- XssBot-Модульный резидентный бот с супер админкой☆11Updated 2 years ago
- Криптор на шелл-кодах☆9Updated 5 years ago
- This script make any windows compatible with RDP connection☆19Updated 5 months ago
- Multipurpose malware framework☆26Updated 3 years ago
- Fud Runpe Av Evasion / All Av Bypass☆33Updated 2 years ago
- DarkRats Standalone HVNC☆24Updated 3 years ago
- Loader and RunPE file executer☆17Updated 6 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- It contains malicious features that can steal files from BitRAT tools.☆11Updated 3 years ago
- NanoCore rat stub source code☆38Updated 3 years ago
- Akame is an open-source, shellcode loader written in C++17☆20Updated 2 months ago
- Bypassing windows uac, however its an old approach/method but its still unpatched ¯\_(ツ)_/¯☆44Updated 3 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆14Updated 6 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆10Updated 3 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago
- Simple keylogger written in C# which is ready for modifications.☆14Updated 3 years ago
- A windows kernel-mode rootkit with remote control☆12Updated 2 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆27Updated 5 years ago
- A very weird RAT☆19Updated 2 years ago
- 💻 Windows 10 Kernel-mode rootkit☆31Updated 2 years ago
- Reverse Socks5 proxy for windows☆14Updated 2 years ago
- ☆8Updated 5 years ago
- A rework of CMLuaUtil AutoElevated☆25Updated 2 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆28Updated 3 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆31Updated 3 years ago
- UAC bypass abusing WinSxS in "wusa.exe". Referred from and similar to: https://github.com/L3cr0f/DccwBypassUAC , Kudos to L3cr0f and Fuz…☆34Updated 3 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 2 years ago
- Download a .NET payload and run it on memory☆69Updated 6 years ago