abdulkadir-gungor / ZIPtoMalware
It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executable or payload in the zip/rar file without any action. In this way, it can be triggered and run by documents in the compressed file or in the same folder. The second method encrypts the executable file or payloa…
☆39Updated 2 years ago
Related projects: ⓘ
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆29Updated 2 years ago
- ☆23Updated this week
- Source Code for BlueEagle jRAT & Release ☄ 📏☣✒Blue Eagle jRAT is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT]…☆2Updated last year
- ☆24Updated this week
- Lime Crypter Obfuscator Mod☆27Updated 2 months ago
- ☆26Updated this week
- HTTPBotNet☆21Updated 3 years ago
- ☆17Updated this week
- ☆26Updated this week
- ☆23Updated this week
- 🚧 C# UAC Bypass technique using mock directories 🚧☆27Updated 2 years ago
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆31Updated 2 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆9Updated 3 years ago
- ☆17Updated this week
- DarkRat + Dark HVNC + Panel + Spreader + Crypter (SOURCE)☆13Updated 2 years ago
- ☆19Updated this week
- Cronos Crypter is an simple example of crypter created for educational purposes.☆98Updated 2 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆46Updated 3 years ago
- ☆32Updated this week
- HVNC hidden remote VNC desktop with filemanager and backconnect☆38Updated last month
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated 11 months ago
- This is a Rubber Ducky script that downloads an executable file externally while bypassing Windows antivirus and added to the exclusions …☆17Updated 3 years ago
- ☆72Updated this week
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆28Updated 2 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 2 years ago
- A builder for BatchStealer☆21Updated 2 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 3 years ago
- ☆37Updated this week
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆38Updated 2 years ago
- ☆74Updated this week