maxamin / Legacy-Botnets-Source-Code-Collection
legacy Botnets source code Forked from github.com/malwares
☆22Updated 3 years ago
Alternatives and similar repositories for Legacy-Botnets-Source-Code-Collection:
Users that are interested in Legacy-Botnets-Source-Code-Collection are comparing it to the libraries listed below
- Zombie Content management systems exploitation Bot Source☆10Updated 2 years ago
- the assembly shell and backdoor Trojan☆18Updated 3 years ago
- Malware Libraries focused in help Malware Development☆15Updated last year
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆49Updated 3 years ago
- exploitpack extracted from a honeynet which is being prepared by intruduers to be used as an exploitation infrastructure☆14Updated 3 years ago
- lightweight http redirector written in nim☆11Updated 2 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆12Updated 9 months ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆14Updated 3 years ago
- roadmap for being a self-taught hacker☆9Updated last year
- Alleged source code leak of Osiris banking trojan☆37Updated 3 years ago
- This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat o…☆21Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆7Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆38Updated 2 years ago
- ☆17Updated 5 years ago
- Source Code for BlueEagle jRAT & Release ☄ 📏☣✒Blue Eagle jRAT is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT]…☆1Updated 2 years ago
- Yet another powerful payload encoder/decoder☆14Updated 2 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated last year
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 10 months ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆13Updated 2 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 3 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆28Updated 2 years ago
- Modular framework to exploit UPS devices☆63Updated last year
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.☆18Updated 5 months ago
- ☆9Updated 3 months ago
- Conti Ransomware Source Code☆20Updated 2 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- conti locker ransomware source code leak☆30Updated 2 years ago