quantumcore / thawne
Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Thawne keeps checking if your File Exists on the System and is Running. If it's not running then Start it, If it does not exist or is removed Reinstall it.
☆10Updated 4 years ago
Alternatives and similar repositories for thawne:
Users that are interested in thawne are comparing it to the libraries listed below
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 4 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- Control Panel and Builder (Working)☆10Updated 7 years ago
- Using bitsadmin to download our malware and to bypass defender☆27Updated 3 years ago
- KeplerPulse is a tool that generates a Powershell command that once executed on a Machine, Downloads and executes your desired Executable…☆10Updated 3 years ago
- ☣️ Necro Stealer + Web Panel☆10Updated 4 years ago
- Remote Administration Tool For Windows VB.NET☆10Updated 6 years ago
- Download payload to disk and install it to startup then melt.☆35Updated 5 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆13Updated 8 years ago
- Disabling Windows Defender & downloading payload☆20Updated 4 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 5 years ago
- DarkRats Standalone HVNC☆24Updated 2 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆14Updated last year
- Windows Malware Probe of Concept☆21Updated 2 years ago
- Monitor Files and Folders for Changes in Real Time .☆10Updated 6 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆8Updated 2 years ago
- Some stealers in one. Simple to use.☆6Updated 4 years ago
- Simple class to search and upload files☆27Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 5 years ago
- 🚀 Builder of Malware Loader☆15Updated 4 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- C# Admin Control Panel Finder For Windows☆42Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- C# Codedom example / builder☆24Updated 5 years ago
- Stealer of sessions of the Telegram Desktop application on windows 7, 8 and 10 🔑☆9Updated 4 years ago