This repositories has all the best out of Bests RATs the world has ever seen 😨 😈
☆16May 23, 2020Updated 5 years ago
Alternatives and similar repositories for RAT-Army
Users that are interested in RAT-Army are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Covers the Arsenal for the BlackHat☆14Jan 16, 2026Updated 2 months ago
- privilege escalation by piggy-backing user sudo requests☆16Feb 6, 2023Updated 3 years ago
- Agent301 automation scripts that uses no API. Special thanks to @vonssy☆11Nov 9, 2024Updated last year
- dockerfile of Acunetix Web Vulnerability Scanner14(210615184)☆14Jun 24, 2021Updated 4 years ago
- A Kubernetes challenge type plugin for CTFd☆16Nov 21, 2025Updated 4 months ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- This repostiory contains the python code of command and control trojan which will be controlled from the GitHub repo which contains the c…☆15Feb 17, 2023Updated 3 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆13Jul 13, 2023Updated 2 years ago
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Aug 15, 2022Updated 3 years ago
- Wardriving tool for finding Flock Cameras.☆33Feb 2, 2026Updated last month
- General control of Android installations.☆15Jun 4, 2025Updated 9 months ago
- Acunetix automate telegram bot☆11Jul 19, 2024Updated last year
- C2 redirector as a web API☆10May 22, 2021Updated 4 years ago
- Golang Command & Control Server For Managing And Remote Accessing Machines Via Web Interface☆13Apr 13, 2023Updated 2 years ago
- A curated list of awesome iOS ecosystem, including Objective-C and Swift Projects☆11Dec 19, 2016Updated 9 years ago
- Abusing autoElevate - Fully Undetectable UAC Bypass exploit☆11Jul 15, 2022Updated 3 years ago
- This was a weekend hack to find bitcoin addresses with a weak private key (or to be exact generated via weak seeds). Also see BlackHat ta…☆16Aug 4, 2019Updated 6 years ago
- I created this to dump challenge for CTF that I participated☆12May 26, 2023Updated 2 years ago
- ☆13May 21, 2021Updated 4 years ago
- An authenticator that implements two-step verification service using the Time-base OTP algorithm. (CSE Project)☆12Apr 9, 2025Updated 11 months ago
- IoT device scanner with CVE database and many features.☆14Mar 8, 2026Updated 2 weeks ago
- Recently got a Galaxy S10 for work, using this to debloat.☆10Sep 15, 2022Updated 3 years ago
- Collection of white, grey and blackHat tools - for use playing around. setting up and operating pentesting linux builds - Primarily Kali-…☆23May 15, 2018Updated 7 years ago
- Nethunter kernel for exynos9820 and 9825 devices. current support is only enabled for d2s.☆14Sep 26, 2021Updated 4 years ago
- A Magisk Module containing a massive collection live wallpapers from Google, Oneplus, Meizu, ROG, Xiaomi, Samsung and more☆14May 31, 2021Updated 4 years ago
- WiFikill Tool is a comprehensive utility designed to help security professionals and ethical hackers assess the security of wireless netw…☆22Oct 18, 2023Updated 2 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Nov 24, 2021Updated 4 years ago
- This includes CVE-2022-22963, a Spring SpEL / Expression Resource Access Vulnerability, as well as CVE-2022-22965, the spring-webmvc/spri…☆14Mar 31, 2022Updated 3 years ago
- Quickly fuzz URLs and scan for secrets directly in your browser tabs☆52Oct 25, 2025Updated 4 months ago
- "Collection of IoT vulnerability research and exploits, focusing on unauthorized access, CVEs, and popular devices like TP-LINK, Tenda, D…☆20Jan 20, 2025Updated last year
- This repository contains a few of my writeups I made for the famous and addictive TryHackMe CTF (Capture The Flag) challenges.☆11Sep 19, 2021Updated 4 years ago
- ddos_tool_2025 – Powerful open‑source framework for stress testing & DDoS resilience. Supports multi‑layer attacks (L3/L4/L7), Cloudflare…☆22Jul 30, 2025Updated 7 months ago
- Magisk Module to bypass VTS HAL and Kernel config checks on boot.☆20Aug 21, 2020Updated 5 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- .NET decompiler/disassembler with editors that allows to change and compile the code back into the assembly☆20Feb 1, 2022Updated 4 years ago
- A vnc client dll for c#, written in c/c++ and c#, depends on TightVnc 2.7.10, so it can use Tight to push screen faster than vncsharp use…☆18Nov 18, 2019Updated 6 years ago
- Clone and emulate PayPass-enabled MasterCard credit cards for contactless transactions☆16Feb 5, 2020Updated 6 years ago
- Script that installs league of legends automagically!☆13Dec 14, 2023Updated 2 years ago