yatt-ze / MedusaLinks
rshell manager for the game Grey Hack
☆12Updated last year
Alternatives and similar repositories for Medusa
Users that are interested in Medusa are comparing it to the libraries listed below
Sorting:
- PhishX - The Complete Spear Phishing Tool☆14Updated 6 years ago
- Undetectable Windows Payload Generation☆10Updated 7 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆11Updated 2 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated last year
- Remote Administration Tool For Windows VB.NET☆12Updated 6 years ago
- SocksSharp provides support for Socks4/4a/5 proxy servers to HttpClient☆12Updated 4 years ago
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆19Updated last year
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 5 years ago
- Basic disassembly technique to slow down disasm process☆11Updated 5 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Updated 3 years ago
- Sourcecode of Infostealer.Dexter POS Malware and C&C☆46Updated 9 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- Exploit for the vulnerability null pointer derefrence to in XWorm RAT☆13Updated 5 months ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆49Updated 4 years ago
- Simple keylogger written in C# which is ready for modifications.☆14Updated 4 years ago
- Simple little rootkit made in C☆13Updated 4 years ago
- ☆37Updated 6 months ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- Bare Knuckled AV Breaking☆58Updated 7 years ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆16Updated 2 years ago
- Disabling Windows Defender & downloading payload☆21Updated 5 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆20Updated last year
- Agent Tesla Spyware C2 Exploit [PATCHED]☆31Updated 7 years ago
- Simple class to search and upload files☆28Updated 6 years ago
- ☆14Updated 6 years ago
- ☆16Updated 3 months ago