Persistent & Undetectable Malware Backdoor
☆28May 8, 2024Updated last year
Alternatives and similar repositories for stealthware-backdoor
Users that are interested in stealthware-backdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Applying some AV evasion techniques on a metasploit reverse shell☆18Nov 12, 2020Updated 5 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Mar 8, 2023Updated 3 years ago
- Simple console based Windows key-logger created in C++☆16Nov 5, 2021Updated 4 years ago
- cross-platform C2 framework in python 2☆37May 19, 2022Updated 3 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Bypass Windows Defender with py2exe from memory.☆39Feb 10, 2022Updated 4 years ago
- Bypass TPM and SecureBoot Check in Windows 11 Installation.☆13Mar 9, 2023Updated 3 years ago
- Bypass Windows defender syscall☆18Jul 17, 2021Updated 4 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆21Jul 24, 2022Updated 3 years ago
- An opensource Prank Startup Malware for windows developed using C Programming Language.☆24Aug 10, 2020Updated 5 years ago
- persistent windows backdoor with reverse shell☆27May 22, 2020Updated 5 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Aug 11, 2020Updated 5 years ago
- ☆13Dec 27, 2014Updated 11 years ago
- muddyc3_golang☆21Feb 13, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆11Oct 5, 2022Updated 3 years ago
- (Windows/Linux/Mac) Remote Administration Tool☆67Feb 28, 2021Updated 5 years ago
- A Hidden and Undetectable Remote Access Tool written in C++ and Server in Python3.☆69Jan 25, 2024Updated 2 years ago
- Reverse shell macro using Word VBA☆17Oct 10, 2020Updated 5 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆22May 15, 2022Updated 3 years ago
- A batch script for taking information. A bit overdeveloped, and kind of useless.☆39Apr 1, 2023Updated 3 years ago
- a simple C++ tool using the windows registry to disable windows defender☆13Sep 7, 2021Updated 4 years ago
- All Our Products☆12Jan 7, 2021Updated 5 years ago
- Small and convenient C2 tool for Windows targets☆615Mar 8, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- HTTPS GET RAT and Memory Loader☆26Jun 10, 2025Updated 10 months ago
- A fully undetected, hidden, persistent, reverse netcat shell backdoor for Windows.☆25Dec 4, 2020Updated 5 years ago
- Babuk v2☆11Sep 28, 2021Updated 4 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Oct 30, 2017Updated 8 years ago
- CVE-2020-12828 PoC and Analysis.☆28Jun 30, 2020Updated 5 years ago
- The best FUD Crypter to make your .exe Trojan fully Undetectable from all AV's and protections☆19Oct 14, 2025Updated 6 months ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- ☆36Sep 25, 2020Updated 5 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Process Hollowing demonstration & explanation☆36Feb 25, 2021Updated 5 years ago
- Basic packer using XOR encryption☆31Mar 29, 2024Updated 2 years ago
- Fateh-Framework is a simple C2 (Command & Control) tool that attacking windows/Linux machines.☆10Mar 10, 2026Updated last month
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated last month
- Oracle WebLogic Server 12.1.3.0.0 / 12.2.1.3.0 / 12.2.1.4.0 / 14.1.1.0.0 Local File Inclusion☆27Jan 25, 2022Updated 4 years ago
- Ransomware hello kitty☆23Mar 18, 2021Updated 5 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆94May 15, 2021Updated 4 years ago