Remote administration tool with native client
☆45May 18, 2025Updated 10 months ago
Alternatives and similar repositories for vxRat
Users that are interested in vxRat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HVNC using virtual desktop☆10Dec 30, 2020Updated 5 years ago
- Plugx 开源情报集合☆24Dec 10, 2024Updated last year
- Annabelle Ransomware, coded for fun.☆13Jul 28, 2020Updated 5 years ago
- ☆43Dec 1, 2025Updated 4 months ago
- 蚁剑反制马☆13Aug 16, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- 个人学习使用,二开DcRAT,主要是增加了功能性插件☆17Jan 26, 2024Updated 2 years ago
- 使用kcp实现的socks5正向代理☆12Dec 9, 2023Updated 2 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35May 8, 2023Updated 2 years ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆14Apr 22, 2020Updated 5 years ago
- Golang implement winrm client with pass the hash☆32Apr 29, 2024Updated last year
- Windows Defender Manager is a tool that helps stop Windows Defender. It works with the Antimalware Service Executable of all versions of …☆43Jan 18, 2025Updated last year
- A rework of CMLuaUtil AutoElevated☆30Nov 6, 2022Updated 3 years ago
- A large collection of Troajn☆36Aug 26, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- can convert EXE/DLL into position-independent shellcode☆41Feb 1, 2026Updated 2 months ago
- ☆15Jun 10, 2024Updated last year
- ☆15Nov 19, 2023Updated 2 years ago
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆18Jun 12, 2025Updated 9 months ago
- shellcode生成框架☆91Jul 11, 2024Updated last year
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆28Sep 12, 2024Updated last year
- Lightweight cryptography☆15Nov 7, 2022Updated 3 years ago
- Remote Access Tool Written In C#☆521Feb 25, 2026Updated last month
- NanoCore rat stub source code☆40May 25, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Fast Delphi screen sharing by sending only the pixels that changed. Great for low-bandwidth or real-time desktop streaming. Included RDP …☆25Mar 10, 2026Updated last month
- This script make any windows compatible with RDP connection☆22Jul 28, 2025Updated 8 months ago
- Windows 7/2008 R2 EoP☆13Feb 12, 2021Updated 5 years ago
- .NET attributes cleaner/Junk remover (nops). Credits to Prab + Illuzion.☆21May 12, 2022Updated 3 years ago
- Take a screenshot without injection for Cobalt Strike☆205Jun 7, 2023Updated 2 years ago
- sliver-webhook 实现上线通知☆26Jun 28, 2023Updated 2 years ago
- 织梦全版本漏洞扫描修改版本☆39Aug 18, 2024Updated last year
- ☆14Jan 17, 2026Updated 2 months ago
- dogxss(基于Go-admin框架和ezxss_payload完成):ezxss的Golang版本.☆81May 19, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆27Dec 13, 2022Updated 3 years ago
- Cross-platform proxy resolution library written in C.☆17Apr 1, 2026Updated last week
- Bypass EDR Create TaskServers☆39Dec 24, 2022Updated 3 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆31Jun 23, 2022Updated 3 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆30Jul 12, 2021Updated 4 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆31Oct 28, 2019Updated 6 years ago
- Self Cleanup in post-ex job☆59Sep 10, 2024Updated last year