sUbc0ol / SLockerLinks
☆10Updated 8 years ago
Alternatives and similar repositories for SLocker
Users that are interested in SLocker are comparing it to the libraries listed below
Sorting:
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆30Updated 7 years ago
- ZeroRemote Trojan SRC Extract☆19Updated 8 years ago
- Sise supplicant exploit kit -- 华软蝴蝶漏洞利用工具包..☆14Updated 9 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Updated 10 years ago
- metasploit loader with antivirus bypass module☆18Updated 9 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- Ring3 Rootkit Backdoor.☆43Updated 10 years ago
- D-RAT SRC Extract☆12Updated 9 years ago
- Introduce you to shellcode development.☆23Updated 9 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Updated 9 years ago
- The Demo for CVE-2018-1000006☆40Updated 8 years ago
- ☆18Updated 9 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆17Updated 2 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 8 years ago
- 来自Freebuf评论区,一个UEFI马.☆51Updated 8 years ago
- Aurora Remote Administration Tool☆20Updated 7 years ago
- powershell to hide process by kd.exe☆31Updated 4 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Updated 7 years ago
- Python script to hook ZIP files passwords in Windows 10☆75Updated 7 years ago
- 使用SSDT HOOK 在windows上隐藏指定文件或者文件夹☆27Updated 4 years ago
- Add my own POC to test Visual Studio trick to run code when building☆21Updated 8 years ago
- Code injection via delay load libraries☆36Updated 8 years ago
- Power Loader botnet☆41Updated 10 years ago
- FUD Metasploit Android Payload☆11Updated 10 years ago
- eqgrp-auction decrypted☆13Updated 8 years ago
- Bootkit for Windows 7☆27Updated 11 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆14Updated 6 years ago
- My manual analysis of malware families☆13Updated 8 years ago
- ☆24Updated 7 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆18Updated 12 years ago