erikbarzdukas / CrunchRAT
HTTPS-based Remote Administration Tool (RAT)
☆26Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for CrunchRAT
- Hide Mimikatz From Process Lists☆17Updated 9 years ago
- Metasploit reverse TCP stager fully undetectable☆17Updated 8 years ago
- A quick tool for hiding a new process running shellcode.☆55Updated 4 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆40Updated last year
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆16Updated last year
- Use powershell to test Office-based persistence methods☆76Updated 3 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆23Updated 5 years ago
- Copy xRAT repository☆22Updated 6 years ago
- Clear All Windows System Logs - AntiForensics☆51Updated 9 years ago
- Exploit the vulnerability to execute the calculator☆68Updated 6 years ago
- An example of a downloader written in NodeJS.☆24Updated 3 years ago
- Slide deck for DefCon Beijing☆39Updated 6 years ago
- ☆36Updated 5 years ago
- Windows Antivirus Evasion and Memory Injection☆12Updated 2 years ago
- Encrypted Shellcode Loader Generator☆22Updated 5 years ago
- powershell to hide process by kd.exe☆32Updated 3 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 4 years ago
- gui uac bypass (netplwiz.exe)☆62Updated 5 years ago
- Proof of concept of VMSA-2017-0012☆41Updated 7 years ago
- Learn from Casey Smith@subTee☆28Updated 3 years ago
- Aggressor Script to launch IE driveby for CVE-2018-15982.☆28Updated 4 years ago
- Loads shellcode from a resource file.☆21Updated 5 years ago
- Cobalt Strike Aggressor Scripts☆29Updated 7 years ago
- Contains poc's and my research works☆31Updated last year
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago