maxamin / Legacy-Botnets-Source-Code-Collection
legacy Botnets source code Forked from github.com/malwares
☆21Updated 3 years ago
Alternatives and similar repositories for Legacy-Botnets-Source-Code-Collection:
Users that are interested in Legacy-Botnets-Source-Code-Collection are comparing it to the libraries listed below
- Powerfull scripts to bypass windows defender☆9Updated 3 years ago
- Zombie Content management systems exploitation Bot Source☆10Updated 3 years ago
- Source Code for BlueEagle jRAT & Release ☄ 📏☣✒Blue Eagle jRAT is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT]…☆1Updated 2 years ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆14Updated 4 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated 10 months ago
- the assembly shell and backdoor Trojan☆18Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- A PowerShell script that simplifies life and therefore... phishing.☆18Updated 2 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 5 years ago
- fully Undetectable payload generator for metasploit☆11Updated 2 years ago
- Simple Tool for webhacking☆11Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat o…☆21Updated last year
- This repository will present all Information interest about Thanatos Ransomware after analysis☆8Updated 6 years ago
- TaskMgr Volatile Environment LPE☆13Updated 4 months ago
- Well, I have created this shit for educational pruposes (I think)☆35Updated 2 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆14Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆7Updated 2 years ago
- exploitpack extracted from a honeynet which is being prepared by intruduers to be used as an exploitation infrastructure☆15Updated 3 years ago
- Windows Keylogger in C++☆19Updated 2 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- conti locker ransomware source code leak☆31Updated 3 years ago
- Persistent & Undetectable Malware Backdoor☆29Updated 10 months ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- ☆9Updated 2 years ago
- Helps To Bypass Av Sometimes☆16Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- Rust Weaponization for Red Team Engagements.☆11Updated 2 years ago
- Conti Ransomware Source Code☆20Updated 3 years ago