This is a collection of RATs for educational purposes
☆59Aug 13, 2025Updated 6 months ago
Alternatives and similar repositories for Cute-RATs
Users that are interested in Cute-RATs are comparing it to the libraries listed below
Sorting:
- This is a collection of Worms for educational purposes☆34Jul 17, 2025Updated 7 months ago
- This is a collection of stealers for educational purposes☆21Aug 13, 2025Updated 6 months ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15May 15, 2024Updated last year
- GAUSS MALWARE Source [Striking similarities with Duqu, FlameR!, Fanny, StuxNet and more.] Source coming soon! + Binaries + Video show…☆17Aug 4, 2022Updated 3 years ago
- PoC plugin for jadx-gui to evaluate methods and update decompiler output☆24Nov 24, 2025Updated 3 months ago
- A bluetooth Rubber ducky on the esp32☆33Mar 25, 2025Updated 11 months ago
- BlueStacks privilege escalation through VM backdooring☆21Jul 16, 2024Updated last year
- The multitool program is designed to easily unlock Windows from malwares.☆14Feb 5, 2026Updated 3 weeks ago
- Lo4f is a sophistochated RAT (Remote Access Trojan), written entirely in python.☆35Feb 10, 2026Updated 3 weeks ago
- KitsuneC2 is a cross-platform adversary emulation tool written in Go.☆12Oct 25, 2024Updated last year
- Sliver agents for Mythic☆48Nov 18, 2024Updated last year
- Documentation, U-Boot and OpenWRT ports for a low-cost MT02 repeater.☆14Oct 27, 2025Updated 4 months ago
- Custom variants for ULTRAKILL.☆12Jul 27, 2025Updated 7 months ago
- Patches the AmsiScan function in clr.dll allowing for unrestricted assembly loading in .NET☆51May 5, 2025Updated 9 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Feb 6, 2026Updated 3 weeks ago
- ☆10Mar 12, 2024Updated last year
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- Monitoring a high precision 10MHz GPS disciplined oscillator (GPSDO)☆13Dec 1, 2024Updated last year
- ☆52Jul 8, 2025Updated 7 months ago
- ☆13Jun 29, 2023Updated 2 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- David is a very funny man☆10Feb 19, 2021Updated 5 years ago
- The Router Exploitation Framework☆12Nov 10, 2017Updated 8 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Jan 25, 2025Updated last year
- ShadeLoader is a shellcode loader designed to bypass most antivirus software. 壳代码, 杀毒软件, 绕过☆45May 22, 2025Updated 9 months ago
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆47Jan 25, 2026Updated last month
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆44Sep 12, 2024Updated last year
- Proof-of-concept exploit for CVE-2024-25153.☆42Mar 13, 2024Updated last year
- PCB design for the initial prototype of OBC hardware, to interface with LaunchPad.☆10Sep 19, 2018Updated 7 years ago
- ☆36Feb 12, 2026Updated 2 weeks ago
- An simple crypter made with Xanthorox AI for Testing v5 pro capabilities☆38Feb 11, 2026Updated 3 weeks ago
- ☆13Nov 8, 2017Updated 8 years ago
- This is a folder with 69 files, and this is a 34 GDI effects(1 file is CMakeList.txt), 34 - compiled files, 34 source code files. Thanks …☆11Mar 10, 2024Updated last year
- Cracking hashes using AWS GPU instances☆10Sep 4, 2017Updated 8 years ago
- Discord Rich presence for QBittorrent made with .NET☆11Updated this week
- Build wordlists from the common-crawl index☆12Oct 9, 2022Updated 3 years ago
- ☆13Oct 10, 2022Updated 3 years ago
- Knowledge base for reverse engineering and malware analysis☆15Jan 11, 2026Updated last month