Skip to content
@Reazmx

Reazmx

Popular repositories Loading

  1. Exe-To-Base64-ShellCode-Convert Exe-To-Base64-ShellCode-Convert Public

    Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution with…

    Visual Basic .NET 1

  2. Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native Public

    Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infe…

    Visual Basic .NET 1

  3. Exe-To-Batch-Convert Exe-To-Batch-Convert Public

    RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payl…

    Visual Basic .NET

  4. Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable Public

    Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.

    Visual Basic .NET

Repositories

Showing 4 of 4 repositories
  • Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable Public

    Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.

    Reazmx/Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable’s past year of commit activity
    Visual Basic .NET 0 MIT 0 0 0 Updated May 14, 2025
  • Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native Public

    Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.

    Reazmx/Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native’s past year of commit activity
    Visual Basic .NET 1 MIT 0 0 0 Updated May 14, 2025
  • Exe-To-Batch-Convert Public

    RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.

    Reazmx/Exe-To-Batch-Convert’s past year of commit activity
    Visual Basic .NET 0 MIT 0 0 0 Updated May 14, 2025
  • Exe-To-Base64-ShellCode-Convert Public

    Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.

    Reazmx/Exe-To-Base64-ShellCode-Convert’s past year of commit activity
    Visual Basic .NET 1 MIT 0 0 0 Updated May 14, 2025

People

This organization has no public members. You must be a member to see who’s a part of this organization.

Top languages

Loading…

Most used topics

Loading…