A Cross Platform multifunctional (Windows/Linux/Mac) Remote Adminstration Tools.
☆24Jan 1, 2021Updated 5 years ago
Alternatives and similar repositories for GhostRat
Users that are interested in GhostRat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- USB rubber ducky 2.O, A simple programmes which stole victim sensitive data by USB in one click & bypass firewall & defender.☆11Apr 21, 2021Updated 4 years ago
- Command line Remote Access tool (RAT) targeting Windows Systems.☆16Sep 16, 2019Updated 6 years ago
- ☆10Oct 1, 2016Updated 9 years ago
- This is a python program backdoor embeded with a game for reverse connection from the victim to understand the use visit our youtube chan…☆11Dec 20, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- 🚀 Builder of Malware Loader☆13Nov 12, 2020Updated 5 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- Latest muhstik release (4.2.2)☆10Mar 25, 2014Updated 12 years ago
- ☆10Mar 29, 2022Updated 3 years ago
- Remote Android Management Tool Via ADB☆12Nov 17, 2023Updated 2 years ago
- Double pulsar tool of NSA leaked by SHADOW BROKERS☆15Jun 16, 2017Updated 8 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Jul 21, 2020Updated 5 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- NSA-Proof Secure P2P Chat client☆11Jul 15, 2015Updated 10 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- Simple CLIENT side bypass for the Microsoft Defender for Cloud Apps Proxy☆16Apr 8, 2022Updated 3 years ago
- No longer maintained. Timing attacks on a browsers cache to try to predict websites/subreddits that have been viewed☆13Mar 26, 2022Updated 4 years ago
- Simple HTTP Pull Botnet with a very cool Web Based C&C Panel☆40Dec 28, 2020Updated 5 years ago
- Tiny read-only unlocker for MS Office documents☆12Aug 18, 2021Updated 4 years ago
- Bypass AntiVirus with Python and Metasploit using shellcode☆11Mar 25, 2016Updated 10 years ago
- The NSA wants access to your all your data, might as well make it easier for them to access the backend of your WordPress install. When …☆27Nov 2, 2016Updated 9 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆20Feb 2, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- Disable Windows Defender All Version☆31Jan 5, 2021Updated 5 years ago
- Tools for assisting the reverse engineering of Qakbot☆11Jul 21, 2021Updated 4 years ago
- Ransomware programado en Python☆10Oct 8, 2020Updated 5 years ago
- Files for generating a C# source file that allows for memory-mapping "niceness" and then executing said "niceness"☆31Feb 28, 2019Updated 7 years ago
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- CROSS PLATFORM MULTI NETCAT SERVER☆12Sep 17, 2025Updated 6 months ago
- 1secmail disposable temp mail service from terminal☆12Dec 5, 2022Updated 3 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- Driver reverse engineering of the Russian Sandworm hacking group's BlackEnergy malware.☆19Apr 27, 2021Updated 4 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- ☆13May 20, 2019Updated 6 years ago
- A small tool to find admin panel of the website☆20Nov 21, 2022Updated 3 years ago
- A small and fast bash script to automate LFI vulnerability.☆11Nov 21, 2022Updated 3 years ago
- A small to find Host Header Injection vulnerabilities in a websites☆12Nov 21, 2022Updated 3 years ago