machine1337 / pycryptLinks
Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products
☆351Updated last year
Alternatives and similar repositories for pycrypt
Users that are interested in pycrypt are comparing it to the libraries listed below
Sorting:
- AV evading OSX Backdoor and Crypter Framework☆288Updated last year
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆160Updated last year
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!☆431Updated 10 months ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆477Updated last year
- Command & Control-Framework created for collaboration in python3☆318Updated last year
- Tool to evade Antivirus With Different Techniques☆182Updated last year
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated last year
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆25Updated last year
- Python AV Evasion Tools☆515Updated 4 months ago
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆474Updated 5 months ago
- zerosum0x0's Koadic☆300Updated 3 years ago
- Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions☆383Updated last year
- Spearphishing tools, generate masqueraded pocket executable☆98Updated 2 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆296Updated 11 months ago
- 「🛡️」AVs/EDRs Evasion tool☆98Updated 5 months ago
- FUD metasploit Persistence RAT☆4Updated 2 years ago
- RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model,…☆284Updated 4 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆182Updated 2 years ago
- Generate FUD backdoors☆248Updated 2 years ago
- ☆122Updated last year
- VenomRAT-HVNC 5.6, this is the latest version with a working HVNC module !☆147Updated 2 years ago
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.☆810Updated 11 months ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆258Updated 4 years ago
- Free advanced and modern Windows botnet with a nice and secure PHP panel developed using VB.NET.☆54Updated 4 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆105Updated last year
- Remote persistent 🔑Logger for Windows and Linux☆298Updated 2 years ago
- ⚡ Create infinite UAC prompts forcing a user to run as admin ⚡☆253Updated 2 years ago
- 365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.☆498Updated 11 months ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆430Updated last year