f3di006 / vxRatLinks
Remote administration tool with native client
☆44Updated 8 months ago
Alternatives and similar repositories for vxRat
Users that are interested in vxRat are comparing it to the libraries listed below
Sorting:
- NanoCore rat stub source code☆38Updated 3 years ago
- A rework of CMLuaUtil AutoElevated☆29Updated 3 years ago
- Windows shellcode encoding and encrypting tool☆20Updated 3 years ago
- Group 4 - C# Remote Administrator Tool☆11Updated 11 months ago
- A stealthy C++ shellcode loader using anti-analysis checks, AES-256 decryption, and dynamic memory permissions to evade detection. Includ…☆21Updated 9 months ago
- ☆20Updated 2 years ago
- 该项目为Shellocde加载器,详细介绍了我们如何绕过防病毒软件,以及该工具如何使用☆22Updated 3 years ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆59Updated 2 months ago
- My personal shellcode loader☆32Updated 2 years ago
- User Mode Windows Rootkit☆69Updated 2 years ago
- 基于Tinynuke修复得到的HVNC☆188Updated 4 years ago
- Use COM Component Bypass UAC,Dll Version☆36Updated 4 years ago
- replace the shellcode chatacters so that reduce the entropy☆18Updated 2 years ago
- ✔A script that turns off Windows Defender☆23Updated 3 years ago
- Amaterasu terminates, or inhibits, protected processes such as application control and AV/EDR solutions by leveraging the Sysinternals Pr…☆78Updated last year
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆51Updated last year
- ShadeLoader is a shellcode loader designed to bypass most antivirus software. 壳代码, 杀毒软件, 绕过☆42Updated 8 months ago
- Fud Runpe Av Evasion / All Av Bypass☆32Updated 2 years ago
- Hide Port In Windows☆42Updated last year
- ☆41Updated 2 years ago
- 简单版的PE加载器☆12Updated 5 years ago
- Evasive loader to bypass static detection☆59Updated 2 years ago
- ☆10Updated last year
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆75Updated 3 years ago
- Bypassing Major EDR's with staged shellcode, custom getmodulehandleW and getprocaddress, veh syscalls & more.☆26Updated 9 months ago
- shellcode loader by c++,免杀,bypass,☆15Updated 3 years ago
- Change hash for a signed pe☆17Updated 2 years ago
- ☆28Updated 2 years ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆50Updated 8 months ago
- CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day☆52Updated 3 years ago