a7t0fwa7 / Pandora-Hvnc-Hidden-Browser-Real-Vnc-Working-Chromium-Edge-Opera-GxLinks
Hidden Features Full Hidden Access Hidden Desktop Hidden Browsers Hidden Cmd Clone Profile Hidden PowerShell Hidden Explorer Hidden Startup Hidden Applications
☆15Updated 2 years ago
Alternatives and similar repositories for Pandora-Hvnc-Hidden-Browser-Real-Vnc-Working-Chromium-Edge-Opera-Gx
Users that are interested in Pandora-Hvnc-Hidden-Browser-Real-Vnc-Working-Chromium-Edge-Opera-Gx are comparing it to the libraries listed below
Sorting:
- ☆41Updated 10 months ago
- Криптор на шелл-кодах☆11Updated 5 years ago
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Updated 3 years ago
- Fud Runpe Av Evasion / All Av Bypass☆33Updated 2 years ago
- A tool implementing process hollowing making your PE polymorphic☆16Updated 5 years ago
- This script make any windows compatible with RDP connection☆20Updated 2 weeks ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Updated 2 years ago
- NanoCore rat stub source code☆38Updated 3 years ago
- BitRat Source Code☆42Updated 4 years ago
- Hellokitty Ransomware Source Code☆16Updated last year
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆10Updated 4 years ago
- Cryline project - It's a simple test ransomware for Windows OS without stable encryption. Pls use this source code for study purposes on…☆59Updated 2 months ago
- Injecting shellcode into a process memory and executing it in C#☆54Updated 2 years ago
- A windows kernel-mode rootkit with remote control☆12Updated 2 years ago
- simple user-mode Rootkit☆105Updated 2 years ago
- It contains malicious features that can steal files from BitRAT tools.☆11Updated 3 years ago
- A Bumblebee-inspired Crypter☆79Updated 2 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆28Updated 3 years ago
- Bypassing windows uac, however its an old approach/method but its still unpatched ¯\_(ツ)_/¯☆44Updated 3 years ago
- Multipurpose malware framework☆27Updated 3 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago
- A rework of CMLuaUtil AutoElevated☆27Updated 2 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆110Updated last year
- UAC bypass abusing WinSxS in "wusa.exe". Referred from and similar to: https://github.com/L3cr0f/DccwBypassUAC , Kudos to L3cr0f and Fuz…☆34Updated 4 years ago
- A Scantime Crytper that applies an obfuscation method onto a malware/false-positive so an antivirus cannot successfully match it with any…☆16Updated 4 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 5 years ago
- POC Ring3 Windows Rootkit (x86 / x64) - Hide processes and files☆57Updated 2 years ago
- 💻 Windows 10 Kernel-mode rootkit☆31Updated 2 years ago
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆89Updated 2 years ago
- Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM☆59Updated 2 years ago