luis22d / ZTrace11-Welcome-FutureLinks
ZTrace 11 is Continuation of the zerotrace.
☆30Updated 4 months ago
Alternatives and similar repositories for ZTrace11-Welcome-Future
Users that are interested in ZTrace11-Welcome-Future are comparing it to the libraries listed below
Sorting:
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆41Updated 6 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆107Updated last year
- Keklick - C2 Hunting, Reporting and Visualization Tool☆62Updated 3 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆85Updated 2 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆54Updated 6 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆140Updated 9 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆79Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- 🙊 Advanced Rat controllable by a telegram bot with many commands and functions.☆16Updated last year
- PDF dropper Red Team Scenairos☆224Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 7 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆71Updated last year
- execute PE in memory Filelessly☆47Updated 8 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆88Updated 8 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆141Updated 3 years ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆82Updated 8 months ago
- A Very Cool Process Injector That supports both Shellcode injection and dll injection☆19Updated last month
- Auto exploitation tool for CVE-2024-24401.☆36Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated 2 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆167Updated last year
- CVE-2025-49144 PoC for security researchers to test and try.☆81Updated 4 months ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆31Updated 3 years ago
- Persistent Powershell backdoor tool {😈}☆122Updated last year
- C2 writen in Rust & Go powered by Tor network.☆144Updated 2 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆200Updated 3 weeks ago
- Google Chrome Cookies Stealer. Steals Chrome cookies☆45Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆26Updated 6 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆126Updated 7 months ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆124Updated 6 months ago