Cryakl / Ultimate-RAT-Collection
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
☆1,491Updated this week
Alternatives and similar repositories for Ultimate-RAT-Collection:
Users that are interested in Ultimate-RAT-Collection are comparing it to the libraries listed below
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆218Updated this week
- Xeno-RAT is an open-source remote access tool (RAT) developed in C#, providing a comprehensive set of features for remote system manageme…☆1,174Updated last year
- TeleTracker is a simple set of Python scripts designed for anyone investigating Telegram channels. It helps you send messages quickly and…☆416Updated 9 months ago
- 🔬Collection of malware, ransomware, RATs, botnets, stealers, etc.☆139Updated 3 years ago
- A repository full of malware samples.☆1,225Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆345Updated 5 months ago
- The essential toolkit for reversing, malware analysis, and cracking☆832Updated 3 months ago
- This repository contains complete resources and coding practices for malware development using Rust 🦀.☆2,054Updated this week
- Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s☆594Updated 8 months ago
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆827Updated 4 years ago
- Complete list of LPE exploits for Windows (starting from 2023)☆763Updated this week
- Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions☆360Updated last year
- WiFi Penetration Testing & Auditing Tool☆490Updated 2 months ago
- Remote Access Trojan collection.(260+ RAT-Builders!)☆218Updated 3 years ago
- A large repository of malware samples with 2500+ malware samples & source codes for a variety of platforms by Cryptware Apps.☆426Updated 2 months ago
- sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment☆641Updated last week
- Remote Access Tool Written In C#☆489Updated 2 years ago
- Phishing with a fake reCAPTCHA☆509Updated 6 months ago
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!☆419Updated 8 months ago
- ⚠️ malware development☆518Updated 9 months ago
- Next-Gen Stealer written in Go. Stealing from Discord, Chromium-Based & Firefox-Based Browsers, Crypto Wallets and more, from every user…☆277Updated 3 months ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆474Updated last year
- Stealer written on C#, logs will be sent to Telegram bot.☆427Updated last month
- A Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jam…☆542Updated last month
- C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.☆624Updated 2 months ago
- PoC to record audio from a Bluetooth device☆1,065Updated 11 months ago
- RedTiger-Tools is a free multi-tool with many features in the areas of Cybersecurity, Pentesting, OSINT, Network Scanning, Discord and Ha…☆888Updated last month
- Collection of various malicious functionality to aid in malware development☆1,608Updated last year
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆387Updated 2 years ago
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆457Updated 3 months ago