giwiro / nakitai
Multiplatform multithread efficient stream rust ransomware
☆16Updated 2 years ago
Alternatives and similar repositories for nakitai:
Users that are interested in nakitai are comparing it to the libraries listed below
- Fully undetectable malware with a backend written in Rust.☆9Updated 2 years ago
- Deobfuscation of XorStringsNet☆12Updated 2 months ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆23Updated last month
- HTTP based framework for building command and control components for remote access trojans☆12Updated 3 years ago
- A utility that can be used to launch an executable with a DLL injected☆19Updated last year
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆10Updated 2 years ago
- ☆12Updated 4 years ago
- Phishing Reverse Proxy with MFA bypass☆16Updated last year
- Rust procedural macro to insert a few asm! calls full of junk instructions in between every line of code.☆12Updated last year
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆16Updated last month
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Updated 10 months ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆40Updated 2 years ago
- Linux rust keylogger☆15Updated 10 months ago
- Self-modifying malware in Rust☆27Updated 2 years ago
- privilege escalation POCs built in Rust.☆20Updated 2 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Updated 9 months ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆11Updated 6 months ago
- ☆12Updated 2 years ago
- 🌮 INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)☆29Updated last year
- Database for custom made as well as publicly available stage-2 or beacons or stageless payloads, used by loaders/stage-1/stagers, or for …☆11Updated 2 months ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Updated last year
- ☆10Updated 2 months ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆17Updated last month
- A simple reverse ssh/proxy implant PoC for *nix systems.☆51Updated 6 months ago
- Parent Process ID Spoofing, coded in CGo.☆22Updated 6 months ago
- MalDev & AV-EDR Evasion for Pentesters☆14Updated last year