fenix544 / BlackRATLinks
Remote Administration Tool made in golang language.
☆11Updated 2 years ago
Alternatives and similar repositories for BlackRAT
Users that are interested in BlackRAT are comparing it to the libraries listed below
Sorting:
- C2 Server for pentesting, exploitation, and payload creation☆12Updated last year
- Resilient, Stealthy & Capable Windows Backdoor. Utilizing Telegram for command relays☆11Updated 2 years ago
- A windows backdoor that's use Telegram as a C2 server.☆14Updated last year
- An interactive mock C2 server☆17Updated 2 years ago
- Decentralised P2P botnet using toxcore.☆178Updated 2 years ago
- Project Summary This project was developed for the Computer Security course at my academic degree. Basically, it will encrypt your files …☆85Updated 4 years ago
- Fully undetectable UAC Bypass exploit - https://youtu.be/KfOPW0XI99s☆17Updated 3 years ago
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆62Updated 4 years ago
- Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.☆60Updated 2 weeks ago
- Polymorphic ELF Virus☆17Updated 3 years ago
- Attack tool for altering packed samples so that they evade static packing detection☆20Updated 8 months ago
- Windows Privilege Escalation Tool☆18Updated last year
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆180Updated 2 years ago
- UNFINISHED Botnet using a Go and Bootstrap Based C2, Support for Windows, Linux and Android Clients.☆100Updated 3 years ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆157Updated 2 years ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆122Updated 5 months ago
- Modern Cross-Platform Peer-to-Peer Botnet over TOR☆48Updated 3 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆97Updated 4 years ago
- Pure Go rewrite of knockknock☆11Updated 2 years ago
- Botnet written in pure Go☆22Updated last year
- Offensive Powershell obfuscator☆27Updated last year
- ☆17Updated 2 years ago
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆204Updated last year
- Self replicating and automatically spreading SSH worm that recovers login credentials☆54Updated 2 years ago
- conti locker ransomware source code leak☆32Updated 3 years ago
- Well, I have created this shit for educational pruposes (I think)☆37Updated 3 years ago
- HTTPBotNet☆20Updated 6 months ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆31Updated 5 years ago
- Advanced dynamic malware analysis tool.☆83Updated last year
- Cronos Crypter is an simple example of crypter created for educational purposes.☆102Updated last year