control windows computeur from telegram
☆70Sep 10, 2023Updated 2 years ago
Alternatives and similar repositories for ThisIsNotRat
Users that are interested in ThisIsNotRat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Jul 2, 2025Updated 10 months ago
- ThisIsNotRat - Control your windows computer from telegram bot☆23Feb 2, 2024Updated 2 years ago
- Dive deep into the world of Remote Desktop Protocol (RDP) with this powerful and efficient brute forcer. Penetration testers and security…☆16Sep 1, 2023Updated 2 years ago
- Origin IP scanning utility developed with ChatGPT☆69Jun 21, 2023Updated 2 years ago
- A small and portable Windows C library for sandbox detection☆36Oct 2, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Super-Mailer Send Inbox To All☆10Jun 8, 2020Updated 5 years ago
- POC of CVE-2023-35086 only DoS☆44Jul 25, 2023Updated 2 years ago
- Simple Powershell Http shell With WEB UI☆74Mar 28, 2025Updated last year
- ICMPWatch: ICMP Packet Sniffer☆57Oct 15, 2024Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Aug 13, 2023Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆83Jan 8, 2024Updated 2 years ago
- WonderCMS Authenticated RCE - CVE-2023-41425☆27Dec 30, 2024Updated last year
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆18Apr 26, 2025Updated last year
- Download payload to disk and install it to startup then melt.☆33Apr 9, 2019Updated 7 years ago
- How to export data from Data grid view to Excel☆12Aug 2, 2021Updated 4 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆130Sep 7, 2023Updated 2 years ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Aug 21, 2023Updated 2 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆108Sep 22, 2023Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- .Net core based utility to sync your IPTV M3U file with tvheadend mux/services☆19Apr 16, 2022Updated 4 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Sep 28, 2023Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Nanocore download for those who want to do malware analysis on it and study it's behavior as well as play around with its features.☆23Jan 6, 2023Updated 3 years ago
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption☆57Oct 1, 2023Updated 2 years ago
- This lightweight C# demo application showcases interactive remote shell access via named pipes and the SMB protocol.☆122Feb 21, 2025Updated last year
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Oct 14, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆53May 26, 2024Updated last year
- vulnlab.com reaper writeup☆27Aug 30, 2023Updated 2 years ago
- Fetch information about a public Google document.☆14Aug 4, 2023Updated 2 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆45Aug 9, 2023Updated 2 years ago
- Windows Defender Killer | Registry-Based Disablement + BYOVD Process Termination (C++)☆533Apr 2, 2026Updated last month
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆32Oct 7, 2024Updated last year
- Bluetooth rubberducky, Keyboard & Mouse Emulator for Kali NetHunter and NetHunter Pro☆15Nov 30, 2025Updated 5 months ago