ErAz7 / NinjaLinks
A general-purpose fully customizable software to control a remote computer behind any NAT, Firewall and proxy. Providing secure shell access, file transfer and shell stream (stream shell output from remote to a local file). Ninja has no prerequisites, you can just download the release and use it right away!
☆39Updated 3 years ago
Alternatives and similar repositories for Ninja
Users that are interested in Ninja are comparing it to the libraries listed below
Sorting:
- A fully customizable CLI application to coummunicate with and send commands to Ninja running behind any NAT, firewall and proxy! Providin…☆26Updated 3 years ago
- The purpose of this tool is to test the window10 defender protection and also other antivirus protection.☆94Updated 2 years ago
- DragonMS is Tools for ddos, scanner, tracker, payload generator msfvenom and scraping☆80Updated 3 years ago
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆235Updated last year
- Fast exploitation based on metasploit.☆74Updated 5 years ago
- Rogue access point tool.☆57Updated 3 years ago
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆91Updated last week
- Simple script masks the phishing link under the normal URL☆85Updated 4 years ago
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆142Updated 5 years ago
- Automated rogue access point setup tool.☆200Updated 4 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆136Updated 2 years ago
- ☆19Updated 7 years ago
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆27Updated 2 years ago
- ⛤Keylogger Generator for Windows written in Python⛤☆55Updated 2 years ago
- steal chrome saved passwords "undetectable"☆51Updated 3 years ago
- An easy to handle hacking script, SSH Forcebrute, FTP Forcebrute and many others features☆63Updated 3 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆43Updated 3 years ago
- 🌐🔍 Red Network Tool is a tool for network exploration and info finding.☆41Updated 3 years ago
- Powerful and smart Traffic Anonymizer using tor as a transparent proxy☆34Updated 6 months ago
- A reverse TCP payload and listener both written in python3.☆30Updated last year
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆121Updated last year
- BruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack☆53Updated 6 years ago
- Big-Papa is a remote cookie stealer which can then be used for session hijacking and Bypassing 2 Factor Authentication☆105Updated 3 years ago
- Easy to understand back door written in python☆36Updated 3 years ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆72Updated 2 years ago
- Fully Undetectable telegram Rat dropper☆36Updated 5 years ago
- Beef Over AWS is a tool that allows you to use Beef-XSS over WAN securly and anonymously.☆40Updated 4 years ago
- Find exploits in local and online database☆78Updated last year
- Android Payload obfuscation and icon injection tool☆72Updated last year
- About All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆69Updated 5 years ago