user696 / GoATSLinks
Go Advance Trojan Server For Windows Using Twitter As The C&C Server
☆19Updated 8 years ago
Alternatives and similar repositories for GoATS
Users that are interested in GoATS are comparing it to the libraries listed below
Sorting:
- Copy xRAT repository☆22Updated 7 years ago
- HTTPS-based Remote Administration Tool (RAT)☆29Updated 9 years ago
- CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.☆45Updated 6 years ago
- jgraphx 4.0.4 build for cs project☆22Updated 4 years ago
- C# AV bypass jank☆33Updated 4 years ago
- PSHinjector autoscript is a tool that inject shellcode(x64 payload) by powershell with python3 programing☆30Updated 5 years ago
- Hide Mimikatz From Process Lists☆18Updated 10 years ago
- Powershell to CodeExecution and ProcessInjection☆64Updated 8 years ago
- Aurora Remote Administration Tool☆20Updated 7 years ago
- Linux AV tests☆13Updated 6 years ago
- ImperiumRAT is an advanced remote administration tool with features like (Remote desktop, Disable CMD, Turn on/off webcam, and more!)☆12Updated 2 years ago
- Modular rootkit framework.☆30Updated 4 years ago
- Python implementation of RSA reverse shell.☆11Updated 8 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 8 years ago
- This is the ToRat client, a part of the ToRat Project.☆25Updated 5 years ago
- Clear All Windows System Logs - AntiForensics☆53Updated 10 years ago
- A Linux RAT in C☆35Updated 6 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆42Updated 7 years ago
- C# code for Transferring Backdoor Payloads by IPv6 Address (AAAA) records and DNS Traffic also Bypassing Anti-viruses☆31Updated 2 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆113Updated 4 years ago
- This is the ToRat server, a part of the ToRat Project.☆23Updated 5 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 6 years ago
- Tool aided persistence via Windows URI schemes abuse☆85Updated 5 years ago
- a open source rat from china☆26Updated 8 years ago
- Slide deck for DefCon Beijing☆39Updated 7 years ago
- Metasploit reverse TCP stager fully undetectable☆18Updated 9 years ago
- Linux Remote Access Trojan (RAT)☆39Updated 8 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆102Updated 7 years ago
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
- A Chrome cookie dumping utility☆45Updated 5 years ago