Simple little rootkit made in C
☆13Feb 15, 2021Updated 5 years ago
Alternatives and similar repositories for fruitkit
Users that are interested in fruitkit are comparing it to the libraries listed below
Sorting:
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- MBR virus☆25Jun 25, 2021Updated 4 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Jun 27, 2019Updated 6 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Sep 9, 2012Updated 13 years ago
- An advanced keylogger with a GUI redirects traffic via TOR, designed to be executed on unix operating systems☆13Mar 2, 2021Updated 5 years ago
- Dump/Steal and decrypt Google Chrome passwords (Windows)☆20Jun 16, 2021Updated 4 years ago
- Payload delivery via URL and some social engineering.☆17Jul 13, 2024Updated last year
- DarkC0ders net is a open source botnet which is programmed in C#, using the .NET 2.0 Framework.☆10Dec 1, 2019Updated 6 years ago
- HydraSide is a opensource Tor Based RAT (*Remote Administration Tool*)☆22Mar 12, 2015Updated 11 years ago
- Remote Administration Tool For Windows VB.NET☆12Mar 19, 2019Updated 7 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- Let's try to create a rootkit!☆19Mar 6, 2020Updated 6 years ago
- Simple C++ cryptolocker Blowfish CBC☆18Apr 13, 2019Updated 6 years ago
- Reverse shell macro using Word VBA☆17Oct 10, 2020Updated 5 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- Responsive Multi-Pages Dashboard using Pure Html , CSS and Js☆13Sep 3, 2023Updated 2 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- Source code of Claw Key logger previously sold on HackForums☆57Aug 6, 2022Updated 3 years ago
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆41Jun 8, 2018Updated 7 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆94May 15, 2021Updated 4 years ago
- A RESTful API System plugin for MyBB 1.6 and 1.8, deploys web services to interact with third-party systems.☆16Sep 6, 2014Updated 11 years ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆16Oct 31, 2016Updated 9 years ago
- Windows Encrypt/Decrypt using AES 256 bit keys☆13Dec 25, 2020Updated 5 years ago
- Reverse TCP Python Framework☆25Nov 7, 2017Updated 8 years ago
- Experiments in weaponizing Crystal for offensive operations.☆29Mar 23, 2023Updated 2 years ago
- ☆13Oct 20, 2021Updated 4 years ago
- Collection of shellcode injection and execution techniques☆18Updated this week
- A C++ String-like-class that does not save data as plain-text in memory. It makes live analysis of memory more difficult, as well as fore…☆13Aug 16, 2014Updated 11 years ago
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 3 years ago
- Stealthy Stand Alone PHP Web Shell☆33Sep 12, 2019Updated 6 years ago
- A simplistic but fast Web Content Scanner written in nodejs.☆11Jun 5, 2025Updated 9 months ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆38Aug 5, 2025Updated 7 months ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆50Jul 13, 2021Updated 4 years ago
- Send files through the ICMP protocol☆44Aug 22, 2014Updated 11 years ago
- Dump mapped PE files from memory to the disk☆20Jun 28, 2019Updated 6 years ago