maxamin / Legacy-Botnets-Source-Code-Collection
legacy Botnets source code Forked from github.com/malwares
☆24Updated 3 years ago
Alternatives and similar repositories for Legacy-Botnets-Source-Code-Collection
Users that are interested in Legacy-Botnets-Source-Code-Collection are comparing it to the libraries listed below
Sorting:
- Zombie Content management systems exploitation Bot Source☆10Updated 3 years ago
- Powerfull scripts to bypass windows defender☆9Updated 3 years ago
- the assembly shell and backdoor Trojan☆19Updated 3 years ago
- Simple keylogger written in C# which is ready for modifications.☆14Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆16Updated 4 years ago
- Simple class to search and upload files☆28Updated 5 years ago
- Conti Ransomware Source Code☆20Updated 3 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 4 years ago
- Handy script to automate the attack☆20Updated 5 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆29Updated 2 years ago
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.☆18Updated 8 months ago
- Persistent & Undetectable Malware Backdoor☆27Updated last year
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- Antiscan.me automatization script☆27Updated 11 months ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Updated last year
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆49Updated 3 years ago
- exploitpack extracted from a honeynet which is being prepared by intruduers to be used as an exploitation infrastructure☆15Updated 3 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆29Updated 6 years ago
- Repository of tools used in my blog☆51Updated last year
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆19Updated 2 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- EXXX EVASION | Metasploit Antivirus Evasion | Fully Undetectable Payloads☆29Updated 5 years ago
- conti locker ransomware source code leak☆31Updated 3 years ago
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆34Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆10Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- This repository will present all Information interest about Thanatos Ransomware after analysis☆8Updated 6 years ago