Stars
CobaltStrike Beacon written in .Net 4 用.net重写了stager及Beacon,其中包括正常上线、文件管理、进程管理、令牌管理、结合SysCall进行注入、原生端口转发、关ETW等一系列功能
Some demos to bypass EDRs or AVs by 78itsT3@m
This is a android spy app, which uploads user data such as contacts, messages, call log, send message(s), photos, videos, open a browser link etc. Android Rat
A method of bypassing EDR's active projection DLL's by preventing entry point exection
Reverse TCP shell in PowerShell for fun. Made in spring 2020 with inspiration from (and a few fixes to) samratashok/nishang Invoke-PowerShellTcp.ps1 and https://cyberwardog.blogspot.com/2016/08/pow…
Arbitrium is a cross-platform, fully undetectable remote access trojan, to control Android, Windows and Linux and doesn't require any firewall exceptions or port forwarding rules
Pegasus Loki Rat is Whatsapp RAT, it integrates new modules, like recording , lockscreen , and locate options. Pegasus Loki RAT is a Python Remote Access Tool.
Cast Android screen via WiFi or USB with low latency
Like AirDroid, but with freedomsauce.
Android backdoored app, improved source code of msfvenom android .apk
backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script should have working knowledge of Linux, Bash, Metasploit, Apktool…
Modified backdoor code plus new embedding technique
Rails c&c web application for spying Android devices
Use Android as Rubber Ducky against another Android device
kNOwlock is a tool to get lockscreen passcode of any windows, android or iPhone device.
a proof of concept badUSB attack which install a apk on Android
A list of useful Powershell scripts with 100% AV bypass (At the time of publication).
Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Bypass UAC by hijacking a DLL located in the Native Image Cache
Blazing fast admin panel finder with asyncio and aiohttp
A tool that finds and scan sites for sql injection vulnerability
Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com