marlkiller / Orcus-1.9.1-crackLinks
c# Orcus RAT i18n 添加中文-zh-cn; 移除授权鉴定
☆34Updated 3 years ago
Alternatives and similar repositories for Orcus-1.9.1-crack
Users that are interested in Orcus-1.9.1-crack are comparing it to the libraries listed below
Sorting:
- Remote administration tool with native client☆39Updated 2 months ago
- Windows PE Signature Thief in C++☆50Updated 4 years ago
- 基于Tinynuke修复得到的HVNC☆166Updated 3 years ago
- Botnet system from deep-web Russians forums. Tiny Nuke!☆92Updated 8 years ago
- NanoCore rat stub source code☆38Updated 3 years ago
- 个人学习使用,二开DcRAT,主要是增加了功能性插件☆17Updated last year
- DcRat汉化,一个简单的C#远控☆46Updated 2 years ago
- ☆20Updated 3 years ago
- Kill Protected Process Light Process (include av)☆58Updated last year
- POC Ring3 Windows Rootkit (x86 / x64) - Hide processes and files☆56Updated last year
- 简单安排一下 autochk.sys 这个rootkit☆71Updated 2 years ago
- Hide processes, files, services in Windows ring3☆25Updated last year
- vs2019 环境 Gh0st编译通过☆11Updated 3 years ago
- windwos内核研究与驱动Code☆64Updated 3 years ago
- A gadget for converting PE files to shellcode.☆12Updated 5 years ago
- User Mode Windows Rootkit☆65Updated last year
- Open-Source Remote Administration Tool For Windows C# (Be Based On AsyncRAT)☆166Updated 4 years ago
- Remote Download and Memory Execute for shellcode framework☆92Updated 2 years ago
- IDA Python script for generating Windows x86 shellcode with one click☆37Updated last year
- A rework of CMLuaUtil AutoElevated☆26Updated 2 years ago
- Convert PE files to a shellcode☆78Updated 5 years ago
- MUA远控木马V2,MUA Remote Access Trojan V2☆66Updated 2 years ago
- This tool reveals hidden desktops and investigate processes/threads utilizing hidden desktops☆121Updated 4 years ago
- shellcode-loaders and beacon-loaders☆64Updated last year
- Session0注入: 用于实现对系统进程的远程线程注入☆13Updated 2 years ago
- Simple Shellcode Loader Using 'Syscall' 'Detours' 'Simple hijacking Shellcode' 'Dynamic Function' to ByPass☆17Updated last year
- Windows API Call Obfuscation☆106Updated 2 years ago
- 该漏洞存在于 NtQueryInformationToken 函数中,特别是在处理AuthzBasepCopyoutInternalSecurityAttributes 函数时,该漏洞源于内核在操作对象时对锁定机制的不当管理,这一失误可能导致恶意实体意外提升权限。☆38Updated last year
- Converts exe to shellcode.☆110Updated last year
- ☆51Updated 3 years ago