☆12Aug 30, 2024Updated last year
Alternatives and similar repositories for CsharpRootkit
Users that are interested in CsharpRootkit are comparing it to the libraries listed below
Sorting:
- ☆53Sep 26, 2024Updated last year
- A uacbypass that works on medium IL that abuses EventViewers unsafe deserialization to RecentViews☆15Aug 29, 2023Updated 2 years ago
- A comprehensive Delphi implementation of reverse SSH tunneling with integrated SOCKS5 proxy capabilities, enabling secure remote access t…☆16Dec 22, 2024Updated last year
- A simple Botnet. 一个简单的僵尸网络Bot。☆21Dec 30, 2020Updated 5 years ago
- spoof an extension of any file by using U+202E Unicode character☆15Nov 5, 2021Updated 4 years ago
- 🔐 Wrapper arround .NET Cryptography library☆17Sep 23, 2025Updated 5 months ago
- using VBS to download and install a powershell malware☆39Jun 28, 2019Updated 6 years ago
- Windows Malware monitors and infects specific kinds of files.☆18Sep 24, 2019Updated 6 years ago
- BashBunny Total P0wn System☆18Sep 16, 2017Updated 8 years ago
- Simple example of how to remove all malwares from disk and registry.☆43Jun 13, 2019Updated 6 years ago
- Simple class to search and upload files☆28Aug 13, 2019Updated 6 years ago
- C# Codedom example / builder☆24Mar 8, 2020Updated 5 years ago
- Ransomware written in go, encrypt - decrypt.☆30Apr 27, 2025Updated 10 months ago
- Create a powershell malware loader to run C#.cs code on runtime☆65Aug 17, 2019Updated 6 years ago
- Rewrite to fit my needs☆32Jul 20, 2024Updated last year
- Detect virtual environment☆67Apr 25, 2019Updated 6 years ago
- Control a system remotely via telegram in Powershell☆14Mar 28, 2025Updated 11 months ago
- ☆10Aug 9, 2024Updated last year
- Script that can scrape and add members in your Telegram Group.☆12Nov 4, 2023Updated 2 years ago
- This tool is a discord autospreader, meaning once infected it will grab the token of anyone on the pc, grab their friends, and send itsel…☆34Apr 28, 2022Updated 3 years ago
- Download and loader .NET payload☆36Oct 8, 2019Updated 6 years ago
- restart adbd with root privileges☆11Oct 21, 2015Updated 10 years ago
- A Windows information stealer / credential stealer written in Go for security research and malware analysis. Demonstrates browser passwo…☆26Dec 15, 2025Updated 2 months ago
- David is a very funny man☆10Feb 19, 2021Updated 5 years ago
- Library for reading and writing dex files☆25Updated this week
- A longitudinal dataset for academic literature, including papers, metadata, and citation graphs, Also available on 🤗 HuggingFace and Kag…☆16Sep 6, 2025Updated 5 months ago
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago
- Yandex browser password recovery☆11Apr 9, 2025Updated 10 months ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- The payload will search for specific files in desktop then upload them as *zip to your web server☆37Sep 24, 2019Updated 6 years ago
- EVM Emergency wallet drainer☆11Aug 2, 2023Updated 2 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- A simple flashable zip to switch between LineageOS and Sailfish OS boots☆11Dec 7, 2020Updated 5 years ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 10 months ago
- Code related to the paper "MobileMEF: Fast and Efficient Method for Multi-Exposure Fusion"☆12Dec 14, 2024Updated last year
- ☆10Dec 27, 2022Updated 3 years ago
- BachDuet enables a human performer to improvise a duet counterpoint with a computer agent in real time.☆14Aug 8, 2022Updated 3 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- A online calculator using web technology based on Javascript.☆10May 29, 2020Updated 5 years ago