Persistent & Undetectable Malware Backdoor
☆28May 8, 2024Updated last year
Alternatives and similar repositories for stealthware-backdoor
Users that are interested in stealthware-backdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Applying some AV evasion techniques on a metasploit reverse shell☆18Nov 12, 2020Updated 5 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Mar 8, 2023Updated 3 years ago
- Simple console based Windows key-logger created in C++☆16Nov 5, 2021Updated 4 years ago
- cross-platform C2 framework in python 2☆38May 19, 2022Updated 3 years ago
- Simple keylogger on C++ with several functions.☆16Jun 19, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- Spawn SYSTEM shells like a PRO!☆10Mar 8, 2023Updated 3 years ago
- Bypass Windows defender syscall☆18Jul 17, 2021Updated 4 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Jul 24, 2022Updated 3 years ago
- Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antiviruses☆40Dec 9, 2020Updated 5 years ago
- persistent windows backdoor with reverse shell☆27May 22, 2020Updated 5 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆42May 18, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆13Dec 27, 2014Updated 11 years ago
- muddyc3_golang☆21Feb 13, 2020Updated 6 years ago
- (Windows/Linux/Mac) Remote Administration Tool☆67Feb 28, 2021Updated 5 years ago
- A Hidden and Undetectable Remote Access Tool written in C++ and Server in Python3.☆69Jan 25, 2024Updated 2 years ago
- Reverse shell macro using Word VBA☆17Oct 10, 2020Updated 5 years ago
- This is a RAT/Backdoor written in C++☆44Dec 30, 2020Updated 5 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆22May 15, 2022Updated 3 years ago
- A batch script for taking information. A bit overdeveloped, and kind of useless.☆39Apr 1, 2023Updated 2 years ago
- a simple C++ tool using the windows registry to disable windows defender☆13Sep 7, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- All Our Products☆12Jan 7, 2021Updated 5 years ago
- Small and convenient C2 tool for Windows targets☆614Mar 8, 2022Updated 4 years ago
- HTTPS GET RAT and Memory Loader☆26Jun 10, 2025Updated 9 months ago
- A fully undetected, hidden, persistent, reverse netcat shell backdoor for Windows.☆25Dec 4, 2020Updated 5 years ago
- PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.☆328Nov 2, 2024Updated last year
- Babuk v2☆11Sep 28, 2021Updated 4 years ago
- Remote Thread Injection by C# + Delegate Techniques☆12Jun 6, 2023Updated 2 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Oct 30, 2017Updated 8 years ago
- CVE-2020-12828 PoC and Analysis.☆28Jun 30, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- ☆35Sep 25, 2020Updated 5 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Process Hollowing demonstration & explanation☆36Feb 25, 2021Updated 5 years ago
- Basic packer using XOR encryption☆31Mar 29, 2024Updated last year
- Fateh-Framework is a simple C2 (Command & Control) tool that attacking windows/Linux machines.☆10Mar 10, 2026Updated 2 weeks ago
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated 2 weeks ago