Windows Remote Post Breach Tool via Telegram
☆135Mar 13, 2018Updated 8 years ago
Alternatives and similar repositories for RAT-via-Telegram
Users that are interested in RAT-via-Telegram are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Various Tools and Docker Images☆280Apr 26, 2025Updated 11 months ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- Modern tactical exploitation toolkit.☆859Mar 9, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Collection of social engineering payloads☆299Oct 19, 2017Updated 8 years ago
- Script to steal passwords from ssh.☆489Dec 19, 2018Updated 7 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆400May 20, 2020Updated 5 years ago
- File Decrypter for the PS4 version 4.05☆16Jan 5, 2018Updated 8 years ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆161Feb 2, 2023Updated 3 years ago
- PowerShell cmdlet to push PowerShell attack modules to a remote system via PSRemoting and if required enable WinRM remotely.☆28Sep 13, 2016Updated 9 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- Executables that execute other stuff☆54Jul 6, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Tool for dropping malware from EK☆40Feb 9, 2018Updated 8 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆145Oct 6, 2019Updated 6 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆95Dec 23, 2020Updated 5 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Dec 8, 2022Updated 3 years ago
- ☆16Jan 15, 2018Updated 8 years ago
- ☆40Mar 17, 2018Updated 8 years ago
- How To Execute Shellcode via HTA☆141Feb 23, 2018Updated 8 years ago
- ☆40Jan 14, 2018Updated 8 years ago
- Modules created by Nettitude for Metasploit☆11Jun 20, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Sep 26, 2021Updated 4 years ago
- ☆58Jul 16, 2017Updated 8 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Jun 8, 2017Updated 8 years ago
- Scripts were written by me☆22Mar 30, 2026Updated 2 weeks ago
- Crack php rand() state☆13May 7, 2018Updated 7 years ago
- UAC bypass, Elevate, Persistence methods☆2,739Feb 13, 2023Updated 3 years ago
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆152Jun 3, 2019Updated 6 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆637Jul 16, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- 4.05 kernel dumping POC with patches☆13Jun 5, 2018Updated 7 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆947May 8, 2019Updated 6 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆412Dec 24, 2019Updated 6 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 8 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Python / C# Unmanaged PowerShell based RAT☆774Mar 29, 2023Updated 3 years ago