loneicewolf / Agent.btzLinks
agent.btz download MALWARE BINARY PROVIDED + POC video
☆17Updated 4 years ago
Alternatives and similar repositories for Agent.btz
Users that are interested in Agent.btz are comparing it to the libraries listed below
Sorting:
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- C & Shellcode Playground..☆10Updated 8 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- A Linux RAT in C☆33Updated 7 years ago
- all published scripts devloped by ahmed khlief☆20Updated 5 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 5 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- Sp00fer blog post -☆24Updated 3 years ago
- AppXSVC Service race condition - privilege escalation☆30Updated 6 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆21Updated 5 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Updated 5 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated last week
- ☆27Updated 3 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Updated 3 years ago
- Display Languages Volatile Environment LPE☆12Updated 7 months ago
- Random code snippets☆11Updated 2 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Updated 8 years ago
- Raw syscall implementations with Powershell☆29Updated 6 years ago
- ☆17Updated 6 years ago
- Bypass Windows Defender with py2exe from memory.☆40Updated 4 years ago
- Enter Product Key Volatile Environment LPE☆13Updated 7 months ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Updated 2 months ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆41Updated 4 years ago
- Antiscan.me automatization script☆29Updated last year
- A simple injector that uses LoadLibraryA☆18Updated 5 years ago
- CloudflaredRAT is a simple combination of popular open-source tools, wrapping a local-facing shell with Cloudflares Argo Tunnel in an exe…☆14Updated 5 years ago
- TaskMgr Volatile Environment LPE☆16Updated 7 months ago