securesean / EducationalRATLinks
Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@secure_sean) to demonstrate to defenders the ease, speed, development goals, and characteristics of common malware. This is for educational use only.
☆22Updated 7 years ago
Alternatives and similar repositories for EducationalRAT
Users that are interested in EducationalRAT are comparing it to the libraries listed below
Sorting:
- ☆17Updated 7 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆52Updated last year
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆16Updated 9 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Updated 6 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 6 years ago
- C# Situational Awareness Script☆34Updated 6 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Updated 8 years ago
- ☆14Updated 5 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- Monitor the textual data pasted into Windows clipboard☆29Updated 6 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆32Updated 5 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Updated 6 years ago
- Miscellaneous PowerShell scripts for red team activities☆16Updated 2 weeks ago
- ☆25Updated 7 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Updated 6 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 8 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Updated 5 years ago
- Obtains a crackable hash for the current user account☆23Updated 6 years ago
- Simple shellcode injector.☆14Updated 6 years ago
- Windows 10 Exploit☆30Updated 6 years ago
- Everything related to Cobalt Strike☆15Updated 5 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆47Updated 8 years ago
- ☆30Updated 7 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆12Updated 9 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆46Updated 8 years ago