daedalus / DarkCometLinks
DarkComet
☆13Updated 2 years ago
Alternatives and similar repositories for DarkComet
Users that are interested in DarkComet are comparing it to the libraries listed below
Sorting:
- Simple keylogger on C++ with several functions.☆17Updated 4 years ago
- A collection of malware samples caught by DIONAEA Honeypot☆11Updated 6 years ago
- Fully Undetectable Native C++ Remote Access Agent / Botnet.☆89Updated 5 years ago
- ClipBanker Spy Trojan☆11Updated 8 months ago
- Community driven computer worm☆65Updated 2 years ago
- A Simple Python 3 Reverse Shell Script☆11Updated 6 years ago
- Easy to understand back door written in python☆34Updated 3 years ago
- this makes your payloads, trojans, viruses fully undetectable☆7Updated 7 years ago
- Python Remote Access Tool☆24Updated 5 years ago
- Source code of Claw Key logger previously sold on HackForums☆56Updated 2 years ago
- (Windows/Linux/Mac) Remote Administration Tool☆64Updated 4 years ago
- Repository of tools used in my blog☆51Updated last year
- cross-platform C2 framework in python 2☆41Updated 3 years ago
- HTTP botnet☆61Updated 8 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 6 years ago
- Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Rem…☆76Updated 2 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- An advanced reverse shell written in Python3.☆21Updated 4 years ago
- An advanced Ransomware with CryptoGraphy and all the stuff.☆7Updated 4 years ago
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆22Updated 7 years ago
- KeplerPulse is a tool that generates a Powershell command that once executed on a Machine, Downloads and executes your desired Executable…☆10Updated 3 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆99Updated 4 years ago
- Download payload to disk and install it to startup then melt.☆36Updated 6 years ago
- This is a repository of the source code of various malware targeting the *nix (mostly Linux) operating systems.☆14Updated 8 years ago
- Automated Penetration Testing☆14Updated 4 years ago
- A Simple C&C Server Written In Python☆34Updated 6 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 4 years ago
- A Tool For Crypt File And Bypass AntiVirus Even msfvenom Payloads☆19Updated 5 years ago