BeyTek / ThisIsNotRatLinks
control windows computeur from telegram
☆67Updated last year
Alternatives and similar repositories for ThisIsNotRat
Users that are interested in ThisIsNotRat are comparing it to the libraries listed below
Sorting:
- Clipboard poisoning attack.☆58Updated 5 years ago
- A tool for automatically change the Tor IP address over time.☆88Updated 2 months ago
- Hacking with PasteJacking technique☆22Updated 11 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆61Updated 4 years ago
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆37Updated this week
- This is a exploit with the capability to control ip camera movement even without a username and password.☆58Updated 2 months ago
- A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules…☆124Updated last month
- An OSINT focused tool made with Nodejs!☆94Updated 2 years ago
- DarkCool All Tools For Hacking Activity! List:~ Exploiter, Checker, Webshell Finder, Grabber, Searching, Bruteforce, Random, And Others T…☆147Updated last year
- A social engineering toolkit for performing smishing, and other sms attacks☆88Updated last year
- What is Phone Track? So phonetrack is a type of OSINT that is used to track someone's location just based on their telephone number☆75Updated last year
- ☆21Updated 2 years ago
- Hackerinfo infromations Web Application Security☆72Updated 2 years ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆170Updated last year
- Tracer is an OSINT tool that can be used to detect on which websites a username is currently in use☆116Updated 2 years ago
- POC | Steal user WhatsApp information/data☆65Updated last month
- Embed malware, apks, executables or any other binary file into a PDF, or generate a PDF with malicious link encrusted.☆46Updated 2 years ago
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆80Updated 11 months ago
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 4 years ago
- Redirect All Traffic Through Tor Network For Kali Linux☆191Updated 3 months ago
- Herramienta de OSINT profundo para la red social instagram, esta herramienta esta creada con python para sacar la maxima infornacion de u…☆37Updated last year
- Nmap & SQL injection automation tool☆35Updated 8 months ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated last year
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆70Updated 2 years ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆107Updated last year
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.☆52Updated last year
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆177Updated 10 months ago
- A computer programming AI bot in python django☆50Updated last year
- This is power full BotNet☆41Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated 2 years ago