gnxbr / Unbreakable-Botnet-C2
☆35Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Unbreakable-Botnet-C2
- Bypass Windows Defender with py2exe from memory.☆36Updated 2 years ago
- Disable Windows Defender All Version☆31Updated 3 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 3 years ago
- Download and loader .NET payload☆33Updated 5 years ago
- A shellcode crypto-packing tool for PoC (used with msfvenom payloads)☆15Updated last year
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- Create a powershell malware loader to run C#.cs code on runtime☆63Updated 5 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆46Updated 3 years ago
- 🔅 Reverse shell written on python3☆15Updated 3 years ago
- The payload will search for specific files in desktop then upload them as *zip to your web server☆33Updated 5 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆36Updated 2 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆31Updated 5 years ago
- using VBS to download and install a powershell malware☆39Updated 5 years ago
- AMSI Bypass for powershell☆30Updated 2 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆27Updated 2 years ago
- A fully undetectable payload generator in python. working in 2021.☆16Updated last year
- Koadic C3 COM Command & Control - JScript RAT☆43Updated 7 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆36Updated 3 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆16Updated 5 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 3 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆95Updated 3 years ago
- A simple injector that uses LoadLibraryA☆16Updated 4 years ago
- An advanced Ransomware with CryptoGraphy and all the stuff.☆7Updated 3 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 4 years ago
- pwn☆11Updated 3 years ago
- Simple class to search and upload files☆26Updated 5 years ago