melardev / XeytanWin32-RAT
WORK IN PROGRESS. RAT written in C++ using Win32 API
☆18Updated 5 years ago
Alternatives and similar repositories for XeytanWin32-RAT:
Users that are interested in XeytanWin32-RAT are comparing it to the libraries listed below
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆8Updated 5 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18Updated 6 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆16Updated 6 years ago
- ☆10Updated 5 years ago
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
- An example of PE hollowing injection technique☆22Updated 5 years ago
- This is a project to receive Base64 data and decode it in process☆15Updated 4 years ago
- PE Injection with ring3 hook bypass☆10Updated 3 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆32Updated 9 years ago
- Execute an arbitrary command within the context of another process☆19Updated 5 years ago
- An AV evasion PoC tool☆9Updated 6 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆38Updated 4 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆17Updated 3 years ago
- Rebuild of the original Remote Admin Tool☆9Updated 5 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆19Updated 2 years ago
- Loader and RunPE file executer☆16Updated 5 years ago
- Collection of shellcode injection and execution techniques☆15Updated 3 years ago
- Windows Malware Probe of Concept☆21Updated 2 years ago
- Windows Shellcode Testing Utility to Run Shellcode From A File☆12Updated 5 years ago
- Add export function and convert exe to dll☆25Updated 4 years ago
- TCP Asynchronous Socket - Remote Administration Tool☆10Updated 6 years ago
- Phantom DLL Hollowing method implemented in modmap☆17Updated 3 years ago
- Remote Administration Tool For Windows☆13Updated 6 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Updated 5 years ago
- A kernel mode Windows rootkit in development.☆49Updated 3 years ago
- Multipurpose malware framework☆23Updated 3 years ago
- Windows Sandbox Framework☆37Updated 3 years ago
- Access windows machine remotely on HTTP☆11Updated 4 years ago
- Example of async client/server sockets in .NET 5☆16Updated 3 years ago
- Remote PE reflective injection with a simple reflective loader☆31Updated 5 years ago