freakick22 / SpyAILinks
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activity — frame by frame
☆35Updated this week
Alternatives and similar repositories for SpyAI
Users that are interested in SpyAI are comparing it to the libraries listed below
Sorting:
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆35Updated 3 weeks ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆62Updated 10 months ago
- The Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples.☆64Updated last year
- Vibe Malware Triage - MCP server for static PE analysis.☆70Updated 4 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆66Updated last year
- Make an Linux Kernel rootkit visible again.☆57Updated 7 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆50Updated 5 months ago
- ☆47Updated 3 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆126Updated 5 months ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- ☆16Updated 5 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆87Updated 7 months ago
- ☆29Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- BlackHat Asia 2025 code and presentations☆18Updated 5 months ago
- Easy peasy file uploads☆24Updated last month
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 6 months ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆27Updated 6 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- Parent Process ID Spoofing, coded in CGo.☆23Updated 5 months ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆57Updated last year
- ☆58Updated 11 months ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated 2 years ago
- Attacking the cleanup_module function of a kernel module☆46Updated 3 months ago
- Backdooring VSCode Projects☆79Updated 4 months ago
- ECC Public Key Cryptography☆38Updated last year
- ☆19Updated last month
- UAC Bypass using CMSTP in Rust☆32Updated 10 months ago
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆25Updated last year
- POC of GITHUB simple C2 in rust☆53Updated 2 months ago