m4pol / hellcatLinks
A windows backdoor that's use Telegram as a C2 server.
☆14Updated last year
Alternatives and similar repositories for hellcat
Users that are interested in hellcat are comparing it to the libraries listed below
Sorting:
- Resilient, Stealthy & Capable Windows Backdoor. Utilizing Telegram for command relays☆13Updated 2 years ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆133Updated last year
- Triple OS Malware development framework [ MacOS, Linux & Windows ]☆19Updated last year
- Google Chrome Cookies Stealer. Steals Chrome cookies☆47Updated 2 years ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆32Updated 3 years ago
- Golang C2 Server and Agents using XMT (https://github.com/iDigitalFlame/xmt)☆41Updated last month
- Command and Control (C2) framework☆132Updated 8 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆112Updated 2 years ago
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆204Updated last year
- The best powershell obfuscator ever made☆119Updated 6 months ago
- KittyStager is a simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this p…☆229Updated 2 years ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆59Updated 9 months ago
- 「💀」Proof of concept on BYOVD attack☆165Updated last year
- HVNC hidden remote VNC desktop with filemanager and backconnect☆44Updated last year
- Bypass Malware Sandbox Evasion Ram check☆141Updated 3 years ago
- eXtensiable Malware Toolkit: Full Featured Golang C2 Framework with Awesome Features☆103Updated last month
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆137Updated 9 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated 2 years ago
- A C2 framework built for my bachelors thesis☆56Updated 3 weeks ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Updated 2 years ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆34Updated 3 years ago
- Automated .NET AppDomain hijack payload generation☆129Updated last year
- Offensive Powershell obfuscator☆27Updated last year
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆132Updated 2 years ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆163Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Updated 2 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆105Updated 3 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆26Updated last year
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆28Updated 9 months ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++☆259Updated 2 years ago