This repositories has all the best out of Bests RATs the world has ever seen 😨 😈
☆16May 23, 2020Updated 5 years ago
Alternatives and similar repositories for RAT-Army
Users that are interested in RAT-Army are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Covers the Arsenal for the BlackHat☆14Jan 16, 2026Updated 2 months ago
- dockerfile of Acunetix Web Vulnerability Scanner14(210615184)☆14Jun 24, 2021Updated 4 years ago
- 2024 - CANCELED AT REQUEST OF SAMSUNG. This Magisk Module was going to attempt to add missing engineering/combination framework to the de…☆11Jul 18, 2024Updated last year
- A Kubernetes challenge type plugin for CTFd☆16Nov 21, 2025Updated 4 months ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This repostiory contains the python code of command and control trojan which will be controlled from the GitHub repo which contains the c…☆15Feb 17, 2023Updated 3 years ago
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Aug 15, 2022Updated 3 years ago
- Official Black Hat Arsenal Security Tools Repository☆19Jan 1, 2018Updated 8 years ago
- General control of Android installations.☆15Jun 4, 2025Updated 10 months ago
- Acunetix automate telegram bot☆11Jul 19, 2024Updated last year
- C2 redirector as a web API☆10May 22, 2021Updated 4 years ago
- Golang Command & Control Server For Managing And Remote Accessing Machines Via Web Interface☆13Apr 13, 2023Updated 3 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆13Jul 13, 2023Updated 2 years ago
- Get a temporary identity with a temporary email address, name, and phone number.☆12Apr 23, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- I created this to dump challenge for CTF that I participated☆12May 26, 2023Updated 2 years ago
- ☆13May 21, 2021Updated 4 years ago
- An authenticator that implements two-step verification service using the Time-base OTP algorithm. (CSE Project)☆13Apr 9, 2025Updated last year
- Collection of white, grey and blackHat tools - for use playing around. setting up and operating pentesting linux builds - Primarily Kali-…☆24May 15, 2018Updated 7 years ago
- IoT device scanner with CVE database and many features.☆14Mar 8, 2026Updated last month
- Recently got a Galaxy S10 for work, using this to debloat.☆10Sep 15, 2022Updated 3 years ago
- Nethunter kernel for exynos9820 and 9825 devices. current support is only enabled for d2s.☆14Sep 26, 2021Updated 4 years ago
- A Magisk Module containing a massive collection live wallpapers from Google, Oneplus, Meizu, ROG, Xiaomi, Samsung and more☆15May 31, 2021Updated 4 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Nov 24, 2021Updated 4 years ago
- This includes CVE-2022-22963, a Spring SpEL / Expression Resource Access Vulnerability, as well as CVE-2022-22965, the spring-webmvc/spri…☆14Mar 31, 2022Updated 4 years ago
- Android Exploit is an advanced version of rat/payload/botnet and can hack an android device in less than 1 minute and can control multipl…☆13May 8, 2022Updated 3 years ago
- "Collection of IoT vulnerability research and exploits, focusing on unauthorized access, CVEs, and popular devices like TP-LINK, Tenda, D…☆22Jan 20, 2025Updated last year
- ddos_tool_2025 – Powerful open‑source framework for stress testing & DDoS resilience. Supports multi‑layer attacks (L3/L4/L7), Cloudflare…☆21Jul 30, 2025Updated 8 months ago
- Magisk Module to bypass VTS HAL and Kernel config checks on boot.☆20Aug 21, 2020Updated 5 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- .NET decompiler/disassembler with editors that allows to change and compile the code back into the assembly☆20Feb 1, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A vnc client dll for c#, written in c/c++ and c#, depends on TightVnc 2.7.10, so it can use Tight to push screen faster than vncsharp use…☆18Nov 18, 2019Updated 6 years ago
- ☆11Oct 13, 2023Updated 2 years ago
- Script that installs league of legends automagically!☆13Dec 14, 2023Updated 2 years ago
- ☆13Jun 26, 2021Updated 4 years ago
- Cracking RNG: Linear Congruential Generator☆17Jun 2, 2022Updated 3 years ago
- It contains malicious features that can steal files from BitRAT tools.☆12Dec 19, 2021Updated 4 years ago
- ☆13Apr 13, 2023Updated 3 years ago