mave12 / Carberp-2.3.1
☆11Updated this week
Related projects: ⓘ
- ☆11Updated this week
- ☣️ Necro Stealer + Web Panel☆10Updated 4 years ago
- Loader and RunPE file executer☆17Updated 5 years ago
- ☆14Updated this week
- Phantom DLL Hollowing method implemented in modmap☆17Updated 3 years ago
- using the Recycle Bin to insure persistence☆11Updated 2 years ago
- ☆27Updated this week
- Runpe + DInvoke + Syscall☆16Updated 3 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18Updated 6 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆9Updated 5 years ago
- ☆17Updated this week
- Joker Botnet Source LEAKED☆11Updated 3 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆12Updated 2 years ago
- Rebuild of the original Remote Admin Tool☆9Updated 4 years ago
- ☆10Updated this week
- Dump mapped PE files from memory to the disk☆17Updated 5 years ago
- DarkRats Standalone HVNC☆23Updated 2 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆13Updated 5 years ago
- ☆23Updated this week
- POC runtime crypter☆8Updated 5 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Updated 2 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆8Updated 3 years ago
- ☆11Updated this week
- ☆22Updated this week
- Rootkit loader for your rootkit dll, x86/x64 system wide DLL injection (+appinit_dlls registry create) uses heavens gate☆17Updated 3 years ago
- Process injection via KernelCallbackTable☆14Updated 2 years ago
- Bypass UAC by abusing shell protocol handlers☆13Updated 3 years ago
- Using Thread Description To Hide Shellcodes☆13Updated 2 years ago
- Utilizing Alternative Shellcode Execution Via Callbacks☆12Updated 9 months ago
- A very weird RAT☆19Updated 2 years ago