luis22d / ZTrace11-Welcome-FutureLinks
ZTrace 11 is Continuation of the zerotrace.
☆26Updated 3 months ago
Alternatives and similar repositories for ZTrace11-Welcome-Future
Users that are interested in ZTrace11-Welcome-Future are comparing it to the libraries listed below
Sorting:
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆41Updated 5 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆62Updated 2 months ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆122Updated 5 months ago
- 🙊 Advanced Rat controllable by a telegram bot with many commands and functions.☆16Updated last year
- Here are +200 different rats some with source code☆123Updated 2 years ago
- Polymorphic Command & Control☆96Updated 7 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆84Updated last month
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆107Updated last year
- PDF dropper Red Team Scenairos☆222Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆78Updated last year
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆141Updated 8 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆199Updated 7 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆141Updated 3 years ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆53Updated 5 months ago
- .NET Antivirus Evasion Tool (Exe2Bat)☆40Updated 3 years ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆84Updated 7 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆121Updated 2 years ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆192Updated last week
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆113Updated last week
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆30Updated 3 years ago
- The best powershell obfuscator ever made☆112Updated 2 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆110Updated 2 years ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆245Updated 5 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆83Updated 5 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆126Updated 6 months ago
- ☆128Updated 11 months ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆82Updated 7 months ago
- 🦎Triton_RAT is free and easy to use, one of the best remote administration tools written in Python, fully integrated with Telegram🦎☆63Updated last month
- A command and control framework.☆55Updated 9 months ago