fenix544 / BlackRATLinks
Remote Administration Tool made in golang language.
☆11Updated 2 years ago
Alternatives and similar repositories for BlackRAT
Users that are interested in BlackRAT are comparing it to the libraries listed below
Sorting:
- Resilient, Stealthy & Capable Windows Backdoor. Utilizing Telegram for command relays☆13Updated 2 years ago
- An interactive mock C2 server☆17Updated 2 years ago
- Project Summary This project was developed for the Computer Security course at my academic degree. Basically, it will encrypt your files …☆88Updated 4 years ago
- A windows backdoor that's use Telegram as a C2 server.☆14Updated last year
- C2 Server for pentesting, exploitation, and payload creation☆12Updated last year
- Fully undetectable UAC Bypass exploit - https://youtu.be/KfOPW0XI99s☆17Updated 4 years ago
- Modern Cross-Platform Peer-to-Peer Botnet over TOR☆47Updated 3 years ago
- Polymorphic ELF Virus☆18Updated 3 years ago
- This is a POC for the CVE-2023-3883 exploit targeting WinRAR up to 6.22. Modified some existing internet-sourced POCs by introducing grea…☆13Updated 2 years ago
- reCAPTCHA lookalike widget☆57Updated 9 months ago
- This is not a crack and not a reverse either. Lockbit RW Source codes have been completely leaked. I'm sharing it so that you don't pay f…☆40Updated 2 years ago
- Golang anti-vm framework for Red Team and Pentesters☆128Updated 2 years ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆137Updated 9 months ago
- UNFINISHED Botnet using a Go and Bootstrap Based C2, Support for Windows, Linux and Android Clients.☆100Updated 3 years ago
- Decentralised P2P botnet using toxcore.☆179Updated 3 years ago
- Metamorphic engine written in Rust.☆19Updated 3 years ago
- Ransomware written in go, encrypt - decrypt.☆29Updated 9 months ago
- A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)☆23Updated 3 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆26Updated last year
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆61Updated 4 years ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆59Updated 9 months ago
- Cronos Crypter is an simple example of crypter created for educational purposes.☆103Updated last year
- A fast, lightweight botnet written in pure C.☆41Updated 4 years ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆28Updated 9 months ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆80Updated 2 years ago
- Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.☆65Updated 3 weeks ago
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆204Updated last year
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆92Updated 4 years ago
- Triple OS Malware development framework [ MacOS, Linux & Windows ]☆19Updated last year
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆47Updated 3 years ago