realaravinth / athena
HTTP based framework for building command and control components for remote access trojans
☆12Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for athena
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- Recon-ng modules for basic OSINT.☆10Updated 2 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- 🔅 Reverse shell written on python3☆15Updated 3 years ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆13Updated last year
- 🚧 C# UAC Bypass technique using mock directories 🚧☆27Updated 2 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆19Updated 10 months ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 2 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆46Updated 3 years ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 3 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆11Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆22Updated 2 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 3 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆12Updated last year
- Abusing autoElevate - Fully Undetectable UAC Bypass exploit☆10Updated 2 years ago
- ☆13Updated 7 months ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆37Updated 2 years ago
- Malware Libraries focused in help Malware Development☆10Updated last year
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆12Updated 7 months ago
- ExplorerUACStealer it's a malware that steal credentials provided by users in UAC Auth in explorer using API Hooking with Detours in C++…☆14Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆7Updated 2 years ago
- Machine Learning basics with phishing dataset☆10Updated 3 years ago
- ☆22Updated last year
- ☆14Updated 2 years ago