Plugin Driven Remote Administration Tool (Unsupported)
☆14Sep 23, 2015Updated 10 years ago
Alternatives and similar repositories for MLRat
Users that are interested in MLRat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SharpSploit is a .NET post-exploitation library written in C#☆16Apr 6, 2020Updated 5 years ago
- remote function calling☆17Dec 12, 2015Updated 10 years ago
- An example pattern in C# for watching security events (logon/logoff/privilege)☆17Aug 13, 2018Updated 7 years ago
- 用于绕过杀软的加载器☆28Oct 13, 2025Updated 5 months ago
- a header-only library to dynamically resolve modules and exports while also being able to call them directly☆22Dec 20, 2023Updated 2 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆71Mar 16, 2026Updated last week
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- Append custom data to signed pe file and DONOT DESTROY SIGNED STATUS.☆26Mar 13, 2021Updated 5 years ago
- using VBS to download and install a powershell malware☆39Jun 28, 2019Updated 6 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- Create a powershell malware loader to run C#.cs code on runtime☆65Aug 17, 2019Updated 6 years ago
- MSF moudle jboss invoke deploy getshell Exploit & Jboss jmx-console getshell exploit☆22Apr 4, 2019Updated 6 years ago
- Search Termux Commands and Guide in Termux !!☆11Apr 29, 2022Updated 3 years ago
- This is my own custom fork of Bhassani's original repo, which contains the (unfinished) reverse-engineered WannaCry Ransomware-related fi…☆10Mar 7, 2023Updated 3 years ago
- Kali Linux Cheat Sheet for Penetration Testers☆14Jun 19, 2017Updated 8 years ago
- C2 frameworks for RTO, server and implants for stealth red-teaming mode.☆13Sep 11, 2024Updated last year
- .net debugger / msil interpreter / emulator☆16Oct 26, 2018Updated 7 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- Animecoin Client Source☆14Feb 15, 2026Updated last month
- A simple injector that uses LoadLibraryA☆18Jun 14, 2020Updated 5 years ago
- Research into COM☆19Jan 25, 2020Updated 6 years ago
- Fixes known BinaryFormatter deserialization vulnerabilities☆12Dec 16, 2019Updated 6 years ago
- a simple reverse connected bot in golang.☆17Jun 14, 2022Updated 3 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- ☆13Oct 12, 2022Updated 3 years ago
- 🔱 Ronin the Shogun, WebApp parameter analysis and fuzzer for XSS and SSRF.☆14Sep 8, 2024Updated last year
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 6 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆12Jun 7, 2021Updated 4 years ago
- ImperiumRAT is an advanced remote administration tool with features like (Remote desktop, Disable CMD, Turn on/off webcam, and more!)☆12Dec 7, 2022Updated 3 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆16Sep 21, 2020Updated 5 years ago
- An open source keylogger☆19Dec 26, 2018Updated 7 years ago
- Monitors Windows TCP Connections and Bytes Transferred☆16Mar 16, 2026Updated last week
- Revenge-RAT C# Stub - Fixed☆95Mar 2, 2020Updated 6 years ago
- Remote Access Tool for Windows.☆85Nov 14, 2022Updated 3 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53May 21, 2020Updated 5 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Radio frequency cybersecurity architech research, based on latest severe damage to privacy or modify wireless devices.☆16Sep 11, 2024Updated last year
- WebCruiserWVS 轻量级基于C#的扫描器,椰树扫描器的前身☆11Apr 18, 2018Updated 7 years ago