alyaparan / NjRat-0.7DLinks
About njRAT has been around since at least 2013 and is one of the most prevalent malware families. Built in .NET Framework, the malware provides attackers with remote control over the infected systems, utilizes dynamic DNS for command-and-control (C&C), and uses a custom TCP protocol over a configurable port for communication.
☆11Updated last year
Alternatives and similar repositories for NjRat-0.7D
Users that are interested in NjRat-0.7D are comparing it to the libraries listed below
Sorting:
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- Steal telegram session Bypass 2fa☆18Updated 2 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated last year
- A Simple Script For SSH BruteForce☆36Updated last year
- web based c2 🏴☠️☆13Updated 9 months ago
- fully Undetectable payload generator for metasploit☆11Updated 2 years ago
- 🔅 Reverse shell written on python3☆15Updated 4 years ago
- DOSrat by Criper98 ~ Un Remote Administrator Tool in ITA per Windows☆12Updated 2 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆14Updated last year
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆16Updated 4 years ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- Anubis 7.0☆26Updated 8 months ago
- ☆25Updated 2 years ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆40Updated 3 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated last year
- FUD MSFVenom Payload Gen. CatchYou 2 is a fork from CatchYou by TheLinuxChoice.☆13Updated 4 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆42Updated 2 years ago
- Come on a tool to decode "MD5" + "Sha1" + "Sha256" even if it is very difficult☆12Updated 2 years ago
- IRC botnet, that's mainly used to launch denial-of-service attacks.☆27Updated last year
- 🔮 Python Remote administration tool via telegram☆49Updated last month
- Securely fetch saved passwords from Google☆9Updated last year
- Create a malicious pip package (PoC)☆12Updated last year
- This tool can generate various types of dropper to hide your main payload☆7Updated 2 years ago
- A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.☆12Updated 2 years ago
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)☆32Updated 2 years ago
- An open-source .NET Ransomware☆27Updated 3 years ago
- I present to you AsyncRAT improved version with a STUB which does not bug and which is undetectable via windows defender normally. I invi…☆15Updated 2 years ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆48Updated last year
- hacking tools☆14Updated 2 years ago