control windows computeur from telegram
☆68Sep 10, 2023Updated 2 years ago
Alternatives and similar repositories for ThisIsNotRat
Users that are interested in ThisIsNotRat are comparing it to the libraries listed below
Sorting:
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Jul 2, 2025Updated 8 months ago
- ☆11Aug 31, 2023Updated 2 years ago
- Origin IP scanning utility developed with ChatGPT☆69Jun 21, 2023Updated 2 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- Material del Curso de Hacking Etico con Python☆12May 7, 2023Updated 2 years ago
- GhostSec Scam Detection Tool☆15Feb 11, 2021Updated 5 years ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated last year
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆31Oct 7, 2024Updated last year
- Web Penetration Testing Course Materials☆32May 13, 2024Updated last year
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- Dive deep into the world of Remote Desktop Protocol (RDP) with this powerful and efficient brute forcer. Penetration testers and security…☆16Sep 1, 2023Updated 2 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- ☆16Oct 18, 2024Updated last year
- A small and portable Windows C library for sandbox detection☆35Oct 2, 2023Updated 2 years ago
- How to export data from Data grid view to Excel☆12Aug 2, 2021Updated 4 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆82Jun 5, 2023Updated 2 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- POC of CVE-2023-35086 only DoS☆44Jul 25, 2023Updated 2 years ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- Fetch information about a public Google document.☆13Aug 4, 2023Updated 2 years ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- Dump Linux keyrings☆24Jul 15, 2024Updated last year
- Unauthorized Docker Exploitation Tool☆37Dec 24, 2023Updated 2 years ago
- In-Memory Rootkit For Linux and BSD☆87Aug 9, 2025Updated 7 months ago
- Bash script that backs up Docker images or containers, and then scans them using VirusTotal.☆16May 2, 2023Updated 2 years ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 4 months ago
- Powershell tools used for Red Team / Pentesting.☆81Jan 8, 2024Updated 2 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆45Aug 9, 2023Updated 2 years ago
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!☆446Jul 12, 2024Updated last year
- IDA Pro plugin to aid with the analysis of native IIS modules☆21Aug 1, 2024Updated last year
- ☆18Mar 26, 2024Updated last year
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Sep 22, 2023Updated 2 years ago