we1h0 / ElegyRAT-C-SharpLinks
Open-Source Remote Administration Tool For Windows C# (Be Based On AsyncRAT)
☆164Updated 4 years ago
Alternatives and similar repositories for ElegyRAT-C-Sharp
Users that are interested in ElegyRAT-C-Sharp are comparing it to the libraries listed below
Sorting:
- 基于Tinynuke修复得到的HVNC☆185Updated 4 years ago
- Eternalblue written in CSharp. Contains version detection, vulnerability scanner and exploit of MS17-010☆201Updated 4 years ago
- UAC bypass for x64 Windows 7 - 11(无弹窗版)☆281Updated 3 years ago
- A major platforms RAT Tools .High scalability.Now support Windows/Linux/MacOS☆84Updated 3 years ago
- A builder 🔨 for binding evil program 😈 and normal document 🐣☆164Updated 4 years ago
- CobaltStrike 4.8 Cracked☆65Updated 2 years ago
- A major platform RAT Tool based by Blockchain/P2P.Now support Windows/Linux/MacOS☆403Updated 3 years ago
- Implement load Cobalt Strike & Metasploit&Sliver shellcode with golang☆123Updated 2 years ago
- c++ shellcode loader☆87Updated 3 years ago
- Remote Download and Memory Execute for shellcode framework☆97Updated 3 years ago
- Python script for steal browser cookies☆65Updated 5 years ago
- cs手机版的源码,此处不放源jar包,自行添加编译☆54Updated 3 years ago
- HackBrowserData的反射模块☆176Updated 4 years ago
- LOLBINs that inject a DLL into a given process ID.☆139Updated 4 years ago
- CrossC2 developed based on the Cobalt Strike framework can be used for other cross-platform system control. CrossC2Kit provides some inte…☆228Updated 2 years ago
- Sharp Wifi Password Grabber retrieves in clear-text the Wi-Fi Passwords from all WLAN Profiles saved on a workstation.☆104Updated 4 years ago
- 基于csharp实现的免杀shellcode加载器☆32Updated 4 years ago
- nim,免杀,红队,shellcode,bypass,apt,bypass-av.☆204Updated 2 years ago
- A Builder for Binding EvilFile and Normal File with auto release☆177Updated 4 years ago
- Cobalt Strike AggressorScripts For Red Team☆155Updated 4 years ago
- This is a easy tool for gen VBA code, and bypass most antivirus☆60Updated 4 years ago
- 影子用户 克隆☆232Updated 3 years ago
- A tool for quickly generating fishing Trojan horse.☆98Updated 4 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆277Updated 4 years ago
- An easy tool to disable and enable windows defender protections☆107Updated 3 years ago
- Invoke-Obfuscation-Bypass + PS2EXE 过主流杀软☆54Updated 4 years ago
- Simple executable generator with encrypted shellcode.☆281Updated 3 years ago
- Offensive C# Tooling☆101Updated last year
- PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527☆59Updated 4 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆191Updated 3 years ago