andyvaikunth / GhostCtrlLinks
Decompiled source code of GhostCtrl. It’s not the original source code
☆10Updated 8 years ago
Alternatives and similar repositories for GhostCtrl
Users that are interested in GhostCtrl are comparing it to the libraries listed below
Sorting:
- This tool allows you to stealthily inject a DLL into a process.☆14Updated 10 years ago
- a very simple rootkit for fun☆18Updated 6 years ago
- metasploit loader with antivirus bypass module☆18Updated 9 years ago
- Aurora Remote Administration Tool☆20Updated 7 years ago
- ☆8Updated 7 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆29Updated 6 years ago
- crash poc & Leak info PoC☆18Updated 7 years ago
- TCP Asynchronous Socket - Remote Administration Tool☆10Updated 6 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 12 years ago
- ZeroRemote Trojan SRC Extract☆19Updated 8 years ago
- k8逆向工程,vs2010,webshell、cmdshell、exploit-db、xss、cookiebrowser☆31Updated 6 years ago
- Shellcode Spider of Exploit-DB☆11Updated 7 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 9 years ago
- 来自Freebuf评论区,一个UEFI马.☆47Updated 8 years ago
- Code injection via delay load libraries☆35Updated 7 years ago
- Dalvik Header Plugin for IDA Pro☆22Updated 12 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Updated 7 years ago
- ☆12Updated 7 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Updated 13 years ago
- ☆18Updated 8 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆43Updated 9 years ago
- 使用SSDT HOOK 在windows上隐藏指定文件或者文件夹☆26Updated 4 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆14Updated 6 years ago
- The Demo for CVE-2018-1000006☆40Updated 7 years ago
- L'application pour bloquer un paquet, snipping, analyser le réseau☆11Updated 8 years ago
- SecNews☆16Updated 6 years ago
- it's a simple LKM rootkit.☆12Updated 9 years ago
- 简单的Linux远程控制☆20Updated 8 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- ☆19Updated 9 years ago