tidusjar / xRATLinks
Remote Administration Tool for Windows
☆17Updated 9 years ago
Alternatives and similar repositories for xRAT
Users that are interested in xRAT are comparing it to the libraries listed below
Sorting:
- a open source rat from china☆26Updated 8 years ago
- Copy xRAT repository☆22Updated 7 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆43Updated 9 months ago
- A new idea to build an anti ransomware☆23Updated 4 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆18Updated 3 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- Remote Administration Tool For Windows☆13Updated 7 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆14Updated 6 years ago
- Rekall Memory Forensic Framework☆32Updated 5 years ago
- ETWNetMonv3 is simple C# code for Monitoring TCP Network Connection via ETW & ETWProcessMon/2 is for Monitoring Process/Thread/Memory/Ima…☆40Updated 2 years ago
- Anti-VM, malware sandbox detection and evasion.☆14Updated 3 years ago
- 💉 A tool that allows shellcode injection into another process's memory space. It works for both Windows x64 and x86 systems.☆11Updated 5 years ago
- An example of PE hollowing injection technique☆23Updated 6 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆40Updated 5 years ago
- A simple injector that uses LoadLibraryA☆18Updated 5 years ago
- Gozi-MBR-rootkit Bootkit Modified☆70Updated 8 years ago
- Persistent through COM Hijacking☆21Updated 6 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆29Updated 6 years ago
- Lonely x64 binary to Bypass Win10 UAC utilizing ALPC method with [command line]☆32Updated last year
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- Hollow Process / Dynamic Forking / RunPE injection technique implemented in Python☆53Updated 4 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- Penetration Test / Read Team - C# tools repository☆57Updated 3 years ago
- Several self-defense shellcodes☆22Updated 5 years ago
- ☆13Updated 6 years ago
- Shortcut Downloader☆11Updated 8 years ago
- Word Macro Virus that has a Powershell based Download & Execute Payload☆22Updated 8 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆11Updated 4 years ago
- PoC that manipulates Windows file times using SetFileTime() API☆61Updated 6 years ago