DAILYHIJACKS / RAT-ArmyView external linksLinks
This repositories has all the best out of Bests RATs the world has ever seen π¨ π
β16May 23, 2020Updated 5 years ago
Alternatives and similar repositories for RAT-Army
Users that are interested in RAT-Army are comparing it to the libraries listed below
Sorting:
- Nethunter kernel for exynos9820 and 9825 devices. current support is only enabled for d2s.β12Sep 26, 2021Updated 4 years ago
- β10Jul 1, 2023Updated 2 years ago
- dockerfile of Acunetix Web Vulnerability Scanner14(210615184)β14Jun 24, 2021Updated 4 years ago
- 2024 - CANCELED AT REQUEST OF SAMSUNG. This Magisk Module was going to attempt to add missing engineering/combination framework to the deβ¦β11Jul 18, 2024Updated last year
- Java DNS Post Exploitation Toolβ11Jul 21, 2024Updated last year
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.β20May 17, 2023Updated 2 years ago
- General control of Android installations.β15Jun 4, 2025Updated 8 months ago
- Golang Command & Control Server For Managing And Remote Accessing Machines Via Web Interfaceβ13Apr 13, 2023Updated 2 years ago
- A modern and functional example menu for your Cheats. VB and C#β13Jun 22, 2022Updated 3 years ago
- Proof of concept for the command injection vulnerability affecting the ZTE MF286R router, including an RCE exploit.β10Jan 7, 2023Updated 3 years ago
- β20Feb 22, 2021Updated 4 years ago
- Agent301 automation scripts that uses no API. Special thanks to @vonssyβ11Nov 9, 2024Updated last year
- π» Elevate, UAC bypass, privilege escalation, dll hijack techniquesβ11Nov 23, 2018Updated 7 years ago
- β13May 21, 2021Updated 4 years ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.β18Jan 15, 2022Updated 4 years ago
- Turn your Raspberry Pi Pico into a hacking deviceβ13Mar 7, 2024Updated last year
- C2 redirector as a web APIβ10May 22, 2021Updated 4 years ago
- Malware persistence via COM DLL hijacking. C++ implementation exampleβ13May 2, 2022Updated 3 years ago
- Recently got a Galaxy S10 for work, using this to debloat.β10Sep 15, 2022Updated 3 years ago
- Process injection via KernelCallbackTableβ13Jan 28, 2022Updated 4 years ago
- ddos_tool_2025 β Powerful openβsource framework for stress testing & DDoS resilience. Supports multiβlayer attacks (L3/L4/L7), Cloudflareβ¦β21Jul 30, 2025Updated 6 months ago
- A Magisk Module containing a massive collection live wallpapers from Google, Oneplus, Meizu, ROG, Xiaomi, Samsung and moreβ14May 31, 2021Updated 4 years ago
- β13Jun 26, 2021Updated 4 years ago
- I created this to dump challenge for CTF that I participatedβ12May 26, 2023Updated 2 years ago
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCEβ13Aug 15, 2022Updated 3 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant dataβ13Jul 16, 2019Updated 6 years ago
- β11Oct 13, 2023Updated 2 years ago
- An authenticator that implements two-step verification service using the Time-base OTP algorithm. (CSE Project)β12Apr 9, 2025Updated 10 months ago
- β13Dec 29, 2022Updated 3 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.β15Jun 6, 2022Updated 3 years ago
- Direct syscalls Injection to bypass AV/EDRβ12May 18, 2024Updated last year
- β13Apr 13, 2023Updated 2 years ago
- Abusing autoElevate - Fully Undetectable UAC Bypass exploitβ11Jul 15, 2022Updated 3 years ago
- Android Exploit is an advanced version of rat/payload/botnet and can hack an android device in less than 1 minute and can control multiplβ¦β13May 8, 2022Updated 3 years ago
- Metasploit Frameworkβ11Sep 5, 2017Updated 8 years ago
- β£οΈ Necro Stealer + Web Panelβ10May 2, 2020Updated 5 years ago
- Process Hollowing Detection on a live systemβ13Nov 11, 2017Updated 8 years ago
- It contains malicious features that can steal files from BitRAT tools.β11Dec 19, 2021Updated 4 years ago
- Old 32 bit PE executable protector / crypterβ15Nov 29, 2021Updated 4 years ago