gsoukupuiw / Art3misRATView external linksLinks
A lightweight remote access trojan in Rust
☆31Jun 28, 2024Updated last year
Alternatives and similar repositories for Art3misRAT
Users that are interested in Art3misRAT are comparing it to the libraries listed below
Sorting:
- Self-updatable RAT + C2 server + client.☆16Jun 24, 2024Updated last year
- Bypassing Major EDR's with staged shellcode, custom getmodulehandleW and getprocaddress, veh syscalls & more.☆26Apr 21, 2025Updated 9 months ago
- David is a very funny man☆10Feb 19, 2021Updated 4 years ago
- A feed of malware samples curated from threat intelligence sources.☆28Oct 6, 2023Updated 2 years ago
- make virus without coding☆12Apr 7, 2020Updated 5 years ago
- Ransomware written in go, encrypt - decrypt.☆29Apr 27, 2025Updated 9 months ago
- By far it is my best and biggest GDI malware I've ever created for educational & entertainment purposes.☆30Nov 7, 2024Updated last year
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆28Mar 26, 2023Updated 2 years ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆137Apr 27, 2025Updated 9 months ago
- KitsuneC2 is a cross-platform adversary emulation tool written in Go.☆12Oct 25, 2024Updated last year
- ☆35Apr 3, 2023Updated 2 years ago
- Script that can scrape and add members in your Telegram Group.☆11Nov 4, 2023Updated 2 years ago
- CROSS PLATFORM MULTI NETCAT SERVER☆11Sep 17, 2025Updated 4 months ago
- Control a system remotely via telegram in Powershell☆14Mar 28, 2025Updated 10 months ago
- ☆10Aug 9, 2024Updated last year
- Android client for e-learning platform SWAD (http://openswad.org/).☆20Sep 1, 2022Updated 3 years ago
- A comprehensive Delphi implementation of reverse SSH tunneling with integrated SOCKS5 proxy capabilities, enabling secure remote access t…☆15Dec 22, 2024Updated last year
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 5 months ago
- A longitudinal dataset for academic literature, including papers, metadata, and citation graphs, Also available on 🤗 HuggingFace and Kag…☆16Sep 6, 2025Updated 5 months ago
- https://github.com/VenomCodeDev/VanillifyFabric☆13Jun 24, 2022Updated 3 years ago
- Library for reading and writing dex files☆24Updated this week
- restart adbd with root privileges☆11Oct 21, 2015Updated 10 years ago
- Proof-of-concept exploit for CVE-2024-25153.☆42Mar 13, 2024Updated last year
- BitRat Source Code☆42Oct 23, 2020Updated 5 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- wordpress batch brute force☆11Sep 21, 2021Updated 4 years ago
- Code related to the paper "MobileMEF: Fast and Efficient Method for Multi-Exposure Fusion"☆12Dec 14, 2024Updated last year
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated last month
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆39Nov 28, 2023Updated 2 years ago
- C2 frameworks for RTO, server and implants for stealth red-teaming mode.☆13Sep 11, 2024Updated last year
- Threat Hijacking Simple Implementation☆18Feb 24, 2025Updated 11 months ago
- SSH Bruteforce Basic Script created with C++ to Linux☆10Jan 28, 2023Updated 3 years ago
- BypassAV无net添加windows用户☆10Jan 7, 2021Updated 5 years ago
- Reliable UDP, Author Whg☆15Oct 8, 2019Updated 6 years ago
- EVM Emergency wallet drainer☆10Aug 2, 2023Updated 2 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- A small end-to-end prober and Prometheus stats exporter for a Matrix homeserver☆11Oct 26, 2023Updated 2 years ago
- 免杀☆12May 6, 2024Updated last year
- A simple application to keep on an eye on the availability of HTTP sites☆15Oct 10, 2023Updated 2 years ago