user696 / GoATSLinks
Go Advance Trojan Server For Windows Using Twitter As The C&C Server
☆19Updated 8 years ago
Alternatives and similar repositories for GoATS
Users that are interested in GoATS are comparing it to the libraries listed below
Sorting:
- HTTPS-based Remote Administration Tool (RAT)☆29Updated 9 years ago
- Copy xRAT repository☆22Updated 7 years ago
- Hide Mimikatz From Process Lists☆18Updated 10 years ago
- C# code for Transferring Backdoor Payloads by IPv6 Address (AAAA) records and DNS Traffic also Bypassing Anti-viruses☆31Updated 2 years ago
- C# AV bypass jank☆33Updated 4 years ago
- Linux AV tests☆13Updated 6 years ago
- Powershell to CodeExecution and ProcessInjection☆64Updated 8 years ago
- CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.☆44Updated 6 years ago
- jgraphx 4.0.4 build for cs project☆22Updated 5 years ago
- Tool aided persistence via Windows URI schemes abuse☆85Updated 5 years ago
- Use powershell to test Office-based persistence methods☆76Updated 4 years ago
- Slide deck for DefCon Beijing☆39Updated 7 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆42Updated 8 years ago
- This is the ToRat client, a part of the ToRat Project.☆26Updated 6 years ago
- shell over icmp☆33Updated 12 years ago
- Apache Module Backdoor (PoC)☆48Updated 6 years ago
- ImperiumRAT is an advanced remote administration tool with features like (Remote desktop, Disable CMD, Turn on/off webcam, and more!)☆12Updated 2 years ago
- ☆33Updated 5 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆113Updated 4 years ago
- Metasploit reverse TCP stager fully undetectable☆18Updated 9 years ago
- Simple program for detecting if host(s) are vulnerable to SMB exploit(MS17-010)☆76Updated 8 years ago
- Linux Remote Access Trojan (RAT)☆39Updated 9 years ago
- Modular rootkit framework.☆30Updated 4 years ago
- All about the remote administrative tools☆37Updated 10 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆103Updated 7 years ago
- a open source rat from china☆26Updated 9 years ago
- Aurora Remote Administration Tool☆21Updated 7 years ago
- interesting analysis☆16Updated 7 years ago
- gui uac bypass (netplwiz.exe)☆66Updated 6 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 6 years ago