Cryakl / Ultimate-RAT-CollectionLinks
For educational purposes only, exhaustive samples of 500+ classic/modern trojan builders including screenshots.
☆3,019Updated this week
Alternatives and similar repositories for Ultimate-RAT-Collection
Users that are interested in Ultimate-RAT-Collection are comparing it to the libraries listed below
Sorting:
- Xeno-RAT is an open-source remote access tool (RAT) developed in C#, providing a comprehensive set of features for remote system manageme…☆1,385Updated last year
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆379Updated last week
- RedTiger-Tools is a free multi-tool with many features in the areas of Cybersecurity, Pentesting, OSINT, Network Scanning, Discord and Et…☆1,567Updated 2 months ago
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆2,681Updated last week
- All-in-One malware analysis tool.☆1,672Updated last month
- Advanced RAT written in Python language, fully controllable through Discord with dedicated GUI builder to make preparation easier.☆1,097Updated 5 months ago
- 🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware thre…☆1,112Updated last year
- A repository full of malware samples.☆1,412Updated last year
- Matkap - hunt down malicious Telegram bots☆755Updated last month
- Useful tool to track location or mobile number☆5,650Updated last year
- Tools and Techniques for Red Team / Penetration Testing☆7,311Updated 6 months ago
- Track the GPS location of the user's smartphone or PC and capture a picture of the target, along with IP and device information.☆1,126Updated 6 months ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,247Updated 4 months ago
- A resource containing all the tools each ransomware gangs uses☆1,216Updated last week
- Tools and Techniques for Blue Team / Incident Response☆3,342Updated 6 months ago
- 🔍 Search anyone's digital footprint across 300+ websites☆3,052Updated last month
- Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).☆526Updated 2 months ago
- OffSec OSINT Pentest/RedTeam Tools☆1,041Updated 3 months ago
- Collection of various malicious functionality to aid in malware development☆1,742Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆2,921Updated 5 months ago
- PoC to record audio from a Bluetooth device☆1,460Updated last year
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,332Updated 8 months ago
- The Network Execution Tool☆4,724Updated this week
- A large repository of malware samples with 2500+ malware samples & source codes for a variety of platforms by Cryptware Apps.☆484Updated 8 months ago
- DetectDee: Hunt down social media accounts by username, email or phone across social networks.☆1,623Updated 2 years ago
- A Onion websites searcher☆597Updated 8 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,158Updated 3 weeks ago
- 🕵️ OSINT Tools for gathering information and actions forensics 🕵️☆2,100Updated 6 months ago
- All-in-One Toolkit for BruteForce Attacks☆888Updated last year
- Open Source Intelligence Interface for Deep Web Scraping☆1,334Updated 2 weeks ago