maxamin / Legacy-Botnets-Source-Code-Collection
legacy Botnets source code Forked from github.com/malwares
☆22Updated 3 years ago
Alternatives and similar repositories for Legacy-Botnets-Source-Code-Collection:
Users that are interested in Legacy-Botnets-Source-Code-Collection are comparing it to the libraries listed below
- the assembly shell and backdoor Trojan☆19Updated 3 years ago
- Zombie Content management systems exploitation Bot Source☆10Updated 3 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆49Updated 3 years ago
- This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat o…☆21Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆29Updated 2 years ago
- Malware Libraries focused in help Malware Development☆18Updated 2 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆15Updated 2 years ago
- exploitpack extracted from a honeynet which is being prepared by intruduers to be used as an exploitation infrastructure☆15Updated 3 years ago
- Source Code for BlueEagle jRAT & Release ☄ 📏☣✒Blue Eagle jRAT is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT]…☆1Updated 2 years ago
- RATs library 2003 to present☆14Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated 11 months ago
- lightweight http redirector written in nim☆11Updated 2 years ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆16Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- web based c2 🏴☠️☆13Updated 8 months ago
- This repository will present all Information interest about Thanatos Ransomware after analysis☆8Updated 6 years ago
- Access Windows 10 without password☆13Updated 4 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Updated 11 months ago
- roadmap for being a self-taught hacker☆7Updated last year
- Powerfull scripts to bypass windows defender☆9Updated 3 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Automate Blind SQL Injection with Python.☆21Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆17Updated 2 years ago