Feature-rich Post Exploitation Framework with Network Pivoting capabilities.
☆93May 15, 2021Updated 4 years ago
Alternatives and similar repositories for maalik
Users that are interested in maalik are comparing it to the libraries listed below
Sorting:
- Source code of Claw Key logger previously sold on HackForums☆55Aug 6, 2022Updated 3 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- ParadoxiaRat : Native Windows Remote access Tool.☆822Apr 18, 2023Updated 2 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Fully Undetectable Native C++ Remote Access Agent / Botnet.☆93Mar 11, 2020Updated 5 years ago
- Open-Source Remote Administration Tool for Windows. 100% FUD Without any Crypter☆172Dec 8, 2022Updated 3 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- PoC code from blog☆16Mar 10, 2020Updated 5 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆17Sep 7, 2019Updated 6 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Dec 2, 2020Updated 5 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Dec 20, 2019Updated 6 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- Red Team C2 and Post Exploitation code☆35Jul 8, 2025Updated 7 months ago
- Tool to generate csrf payloads based on vulnerable requests☆64Oct 9, 2020Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago
- DarkRat source - beware untested source and resources.☆21Dec 7, 2019Updated 6 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- Мутация PE x86☆16Jun 2, 2019Updated 6 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- Simple little rootkit made in C☆13Feb 15, 2021Updated 5 years ago
- [WIP] A free and open-source, modular Remote Administration Tool (RAT) / Payload Dropper written in Go(lang) with a flexible command and …☆229Dec 3, 2023Updated 2 years ago
- automated password spraying tool☆148Jun 15, 2021Updated 4 years ago
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- Command line Remote Access tool (RAT) targeting Windows Systems.☆16Sep 16, 2019Updated 6 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- MBR virus☆25Jun 25, 2021Updated 4 years ago
- Фреймворк криптора/протектора с антиэмуляцией☆32Jun 15, 2019Updated 6 years ago
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- Software Protector☆19Aug 16, 2020Updated 5 years ago
- Packer (actually a crypter) for antivirus evasion implemented for windows PE files (BSc-Thesis)☆106Jun 17, 2020Updated 5 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆17Jul 2, 2019Updated 6 years ago