Pinned Repositories
0ctrl
Zerokit server controller
0lib
Zerokit shared code
agressor-scripts-
amte
Analysis and Modification Tool for Executables
android-R.A.T-Client
This is a R.A.T Client for android phones
Android-RATList
Android - Remote Access Trojan List
Anti-Rootkit
Windows Anti-Rootkit Tool
AsyncRAT-C-Sharp
Open-Source Remote Administration Tool For Windows C# (RAT)
gokturk-source
Simple Linux Rat
PPLKiller-1
Tool to bypass LSA Protection (aka Protected Process Light)
BBBKing's Repositories
BBBKing/symboliclink-testing-tools
BBBKing/Detections
BBBKing/ioctlbf
Windows Kernel Drivers fuzzer
BBBKing/wsuspect-proxy
WSUSpect Proxy - a tool for MITM'ing insecure WSUS connections
BBBKing/Responder-Windows
Responder Windows Version Beta
BBBKing/metasploit-sharp
C# bindings for the Metasploit RPC
BBBKing/WProtect
BBBKing/eqgrp-free-file
Free sampling of files from the purported Equation Group hack.
BBBKing/rkduck
Linux v4.x.x Rootkit
BBBKing/shellsploit-framework
New Generation Exploit Development Kit
BBBKing/nbtscan
NetBIOS scanning tool. Currently segfaults!
BBBKing/wrk-v1.2
Windows Research Kernel
BBBKing/peinjector
peinjector - MITM PE file infector
BBBKing/TDL
Driver loader for bypassing Windows x64 Driver Signature Enforcement
BBBKing/toxscreen
TeamViewer-like screensharing for Tox
BBBKing/DSEFix
Windows x64 Driver Signature Enforcement Overrider
BBBKing/Rovnix
Rovnix Bootkit
BBBKing/WinDivertProxy
Proxy any program via WinDivert to a specific server
BBBKing/mkShellcode
This rearranges an ELF object file so it can be used as shellcode.
BBBKing/tap-windows
Windows TAP driver
BBBKing/vnc2rdp
proxy for RDP client connect to VNC server
BBBKing/HideProcessHookMDL
A simple rootkit to hide a process
BBBKing/CrashWindows
Crashes Windows by doing stupid stuff at kernel level
BBBKing/PE-Injector
Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellcode will be executed, then return control flow to the original entry point of the program. Perhaps a nice way to maintain persistence? Check out the README for full details.