raunvk / stealthware-backdoorView external linksLinks
Persistent & Undetectable Malware Backdoor
☆28May 8, 2024Updated last year
Alternatives and similar repositories for stealthware-backdoor
Users that are interested in stealthware-backdoor are comparing it to the libraries listed below
Sorting:
- Applying some AV evasion techniques on a metasploit reverse shell☆18Nov 12, 2020Updated 5 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Mar 8, 2023Updated 2 years ago
- cross-platform C2 framework in python 2☆38May 19, 2022Updated 3 years ago
- An opensource Prank Startup Malware for windows developed using C Programming Language.☆23Aug 10, 2020Updated 5 years ago
- ☆13Dec 27, 2014Updated 11 years ago
- All Our Products☆12Jan 7, 2021Updated 5 years ago
- persistent windows backdoor with reverse shell☆27May 22, 2020Updated 5 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Remote Thread Injection by C# + Delegate Techniques☆12Jun 6, 2023Updated 2 years ago
- Old 32 bit PE executable protector / crypter☆15Nov 29, 2021Updated 4 years ago
- Simple console based Windows key-logger created in C++☆16Nov 5, 2021Updated 4 years ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆17Feb 23, 2021Updated 4 years ago
- Simple keylogger on C++ with several functions.☆16Jun 19, 2020Updated 5 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44May 18, 2024Updated last year
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- Bypass Windows defender syscall☆18Jul 17, 2021Updated 4 years ago
- Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antiviruses☆40Dec 9, 2020Updated 5 years ago
- muddyc3_golang☆21Feb 13, 2020Updated 6 years ago
- Reverse shell macro using Word VBA☆17Oct 10, 2020Updated 5 years ago
- A Hidden and Undetectable Remote Access Tool written in C++ and Server in Python3.☆69Jan 25, 2024Updated 2 years ago
- A batch script for taking information. A bit overdeveloped, and kind of useless.☆39Apr 1, 2023Updated 2 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Jul 24, 2022Updated 3 years ago
- This is a RAT/Backdoor written in C++☆44Dec 30, 2020Updated 5 years ago
- Making Shellcode fully undetectable using uuid☆23May 7, 2021Updated 4 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Jun 16, 2020Updated 5 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21May 15, 2022Updated 3 years ago
- Ransomware hello kitty☆23Mar 18, 2021Updated 4 years ago
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- Small and convenient C2 tool for Windows targets☆612Mar 8, 2022Updated 3 years ago
- HTTPS GET RAT and Memory Loader☆26Jun 10, 2025Updated 8 months ago
- A small .NET compression utility☆57Feb 2, 2022Updated 4 years ago
- reverse shell + keylogger + wifis password stealing + screen sharing + camera sharing☆29Jan 13, 2021Updated 5 years ago
- Process Injection: CreateRemoteThread☆26Dec 17, 2020Updated 5 years ago
- CVE-2020-12828 PoC and Analysis.☆28Jun 30, 2020Updated 5 years ago
- Process Injection: APC Injection☆32Jan 13, 2021Updated 5 years ago
- Basic packer using XOR encryption☆31Mar 29, 2024Updated last year
- ☆31Aug 23, 2020Updated 5 years ago
- The best FUD Crypter to make your .exe Trojan fully Undetectable from all AV's and protections☆19Oct 14, 2025Updated 4 months ago