syrex1013 / RexCrypterLinks
Crypter made in C#. Nearly FUD. Detection rate 2/38
☆52Updated 6 months ago
Alternatives and similar repositories for RexCrypter
Users that are interested in RexCrypter are comparing it to the libraries listed below
Sorting:
- JS Jscript - download file from url then run it☆60Updated 5 years ago
- Download a payload and make it run from registry without droppng.☆109Updated 6 years ago
- Polymorph file protector☆43Updated 6 years ago
- njRAT C# Stub - Fixed For PowerShell☆60Updated 6 years ago
- Simple example of how to remove all malwares from disk and registry.☆42Updated 6 years ago
- Revenge-RAT C# Stub - Fixed☆94Updated 5 years ago
- Simple C# Keylogger (Keyboard Layout)☆65Updated 6 years ago
- Escalation / Bypass Windows UAC☆115Updated 6 years ago
- Create a powershell malware loader to run C#.cs code on runtime☆65Updated 6 years ago
- Download a .NET payload and run it on memory☆70Updated 6 years ago
- Simple Malware Downloader☆128Updated 6 years ago
- Crypter For Malware and Stealer☆33Updated 5 years ago
- Download payload to disk and install it to startup then melt.☆35Updated 6 years ago
- Simple class to search and upload files☆28Updated 6 years ago
- The payload will search for specific files in desktop then upload them as *zip to your web server☆37Updated 6 years ago
- Detect virtual environment☆67Updated 6 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Updated 5 years ago
- using VBS to download and install a powershell malware☆39Updated 6 years ago
- Program for remote computer management with Telegram on native C++ - by B4DB4B3☆115Updated 4 years ago
- a basic IDE compiler for C# and VB.NET using codedom☆45Updated 6 years ago
- C# Admin Control Panel Finder For Windows☆46Updated 6 years ago
- Source code of Claw Key logger previously sold on HackForums☆54Updated 3 years ago
- C# Codedom example / builder☆24Updated 5 years ago
- I am not responsible for what is done with this project. This tool is solely written to be studied by other security researchers to see h…☆22Updated last year
- Hide malware behind a legit process C#☆127Updated 5 years ago
- An open-source, centralized HTTPS botnet☆45Updated 5 years ago
- Browser and apps data stealer☆23Updated last year
- Disable WD using VBS☆118Updated 3 years ago
- Simple way to read wirte delete values from registry☆18Updated 6 years ago
- Malware USB Spread | Example C#☆187Updated 6 years ago