fenix544 / BlackRATLinks
Remote Administration Tool made in golang language.
☆12Updated 2 years ago
Alternatives and similar repositories for BlackRAT
Users that are interested in BlackRAT are comparing it to the libraries listed below
Sorting:
- Resilient, Stealthy & Capable Windows Backdoor. Utilizing Telegram for command relays☆11Updated 2 years ago
- An interactive mock C2 server☆16Updated 2 years ago
- C2 Server for pentesting, exploitation, and payload creation☆12Updated last year
- Modern Cross-Platform Peer-to-Peer Botnet over TOR☆47Updated 2 years ago
- A windows backdoor that's use Telegram as a C2 server.☆14Updated last year
- Fully undetectable UAC Bypass exploit - https://youtu.be/KfOPW0XI99s☆17Updated 3 years ago
- Project Summary This project was developed for the Computer Security course at my academic degree. Basically, it will encrypt your files …☆85Updated 4 years ago
- Pure Go rewrite of knockknock☆11Updated 2 years ago
- Near compile-time string obfuscation for Golang☆12Updated last year
- Linux and Windows VMs evasion fully written in Go☆36Updated 10 months ago
- Polymorphic ELF Virus☆17Updated 3 years ago
- Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.☆59Updated last year
- Decentralised P2P botnet using toxcore.☆178Updated 2 years ago
- Golang anti-vm framework for Red Team and Pentesters☆128Updated 2 years ago
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆78Updated 2 years ago
- Simple ELF runtime packer for creating self-protecting binaries☆23Updated 2 years ago
- Attack tool for altering packed samples so that they evade static packing detection☆19Updated 7 months ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆119Updated 4 months ago
- execute a PE in the address space of another PE aka process hollowing☆58Updated 3 years ago
- Advanced dynamic malware analysis tool.☆84Updated last year
- Reworking Mirai with Decentralized Botnet architecture☆34Updated last year
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆98Updated 4 years ago
- Cronos Crypter is an simple example of crypter created for educational purposes.☆102Updated 11 months ago
- A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)☆24Updated 2 years ago
- Botnet written in pure Go☆22Updated last year
- Ransomware written in go, encrypt - decrypt.☆27Updated 4 months ago
- using the gpu to hide your payload☆59Updated 3 years ago
- A fast, lightweight botnet written in pure C.☆38Updated 3 years ago
- Perform Thread Hijacking Shellcode Injection without OpenProcess and OpenThread mapping all the free handles in memory☆14Updated last year