jcrvnx / XenoRATLinks
This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained by me indefinitely.
☆19Updated 5 months ago
Alternatives and similar repositories for XenoRAT
Users that are interested in XenoRAT are comparing it to the libraries listed below
Sorting:
- ☆44Updated 3 months ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- Early cascade injection PoC based on Outflanks blog post written in Rust☆56Updated 7 months ago
- ☆58Updated 11 months ago
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆61Updated 7 months ago
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 11 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆59Updated 4 months ago
- command control framework☆23Updated 3 weeks ago
- ☆53Updated 4 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆44Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆70Updated last month
- POC of GITHUB simple C2 in rust☆52Updated 2 months ago
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆25Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆58Updated 4 months ago
- ☆53Updated last week
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Updated 8 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆83Updated 11 months ago
- DFSCoerce exe revisited version with custom authentication☆41Updated last year
- Bypasses AMSI protection through remote memory patching and parsing technique.☆50Updated 4 months ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆38Updated last year
- ☆37Updated 6 months ago
- A lightweight, modular Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).☆58Updated last week
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆72Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆71Updated last year
- ☆37Updated 10 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- Convert your shellcode into an ASCII string☆119Updated 3 months ago
- PowerShell script to generate ShellCode in various formats☆43Updated last year
- Research into WinSxS binaries and finding hijackable paths☆28Updated 5 months ago