nullsecuritynet / toolsLinks
Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
☆64Updated 2 months ago
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below
Sorting:
- AES-256 Microsoft Cryptography API Example Use.☆34Updated 2 years ago
- Cross-platform RAT, written in C☆88Updated 3 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆131Updated 4 years ago
- Antivirus Signature Search Toolkit☆82Updated 2 years ago
- using the gpu to hide your payload☆63Updated 3 years ago
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆41Updated 2 years ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆57Updated 7 months ago
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆18Updated 2 years ago
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆92Updated 2 months ago
- 「🧊」Ring 3 Rootkit for Windows 10☆60Updated last year
- Malware Libraries focused in help Malware Development☆26Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 3 years ago
- ☆17Updated 6 years ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆108Updated 5 years ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆19Updated 2 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆76Updated last year
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆34Updated 3 years ago
- Remcos RAT V3.8.0 Latest version☆33Updated 3 years ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆47Updated 3 years ago
- Hellokitty Ransomware Source Code☆18Updated 2 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆32Updated 3 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 6 years ago
- Bypass Malware Sandbox Evasion Ram check☆141Updated 2 years ago
- DNS over HTTPS targeted malware (only runs once)☆96Updated 2 years ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆58Updated 2 weeks ago
- Crossplatform tool for inject shellcode into .exe and .dll binaries (x86 and x64)☆74Updated last year
- A 2-in-1 toolset of https://github.com/x0rz/EQGRP_Lost_in_Translation and https://github.com/x0rz/EQGRP☆26Updated 6 years ago