safebuffer / HVNC-POCLinks
HVNC using virtual desktop
☆9Updated 4 years ago
Alternatives and similar repositories for HVNC-POC
Users that are interested in HVNC-POC are comparing it to the libraries listed below
Sorting:
- Multipurpose malware framework☆27Updated 3 years ago
- A windows kernel-mode rootkit with remote control☆12Updated 2 years ago
- This script make any windows compatible with RDP connection☆20Updated 2 weeks ago
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Updated 3 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago
- BitRat Source Code☆42Updated 4 years ago
- Loader and RunPE file executer☆18Updated 6 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆18Updated 4 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆9Updated 4 years ago
- DarkRats Standalone HVNC☆24Updated 3 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆10Updated 5 years ago
- Code that allows running another windows PE in the same address space as the host process.☆12Updated 5 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆21Updated 5 years ago
- A Windows lightweight RAT written in C++☆9Updated 4 years ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆18Updated 2 years ago
- NanoCore rat stub source code☆38Updated 3 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆31Updated 4 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 5 years ago
- Get/dump chrome and firefox saved passwords.☆20Updated 4 years ago
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆37Updated 5 years ago
- Basic disassembly technique to slow down disasm process☆11Updated 5 years ago
- Hidden Features Full Hidden Access Hidden Desktop Hidden Browsers Hidden Cmd Clone Profile Hidden PowerShell Hidden Explorer Hidde…☆15Updated 2 years ago
- Windows OS keylogger with a hook mechanism (i.e. with a keyboard hook procedure).☆85Updated 2 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- convert javascript shellcode to c source code☆11Updated 5 years ago
- Joker Botnet Source LEAKED☆12Updated 4 years ago
- C# Codedom example / builder☆24Updated 5 years ago
- Download a .NET payload and run it on memory☆71Updated 6 years ago