ErAz7 / NinjaLinks
A general-purpose fully customizable software to control a remote computer behind any NAT, Firewall and proxy. Providing secure shell access, file transfer and shell stream (stream shell output from remote to a local file). Ninja has no prerequisites, you can just download the release and use it right away!
☆41Updated 2 years ago
Alternatives and similar repositories for Ninja
Users that are interested in Ninja are comparing it to the libraries listed below
Sorting:
- A fully customizable CLI application to coummunicate with and send commands to Ninja running behind any NAT, firewall and proxy! Providin…☆27Updated 2 years ago
- The purpose of this tool is to test the window10 defender protection and also other antivirus protection.☆93Updated last year
- FUD metasploit Persistence RAT☆4Updated 2 years ago
- Advance mitm attack using fake access point☆134Updated 2 years ago
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆27Updated last year
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆227Updated last year
- steal chrome saved passwords "undetectable"☆50Updated 3 years ago
- A tool for building remote access trojan.☆5Updated last year
- ⛤Keylogger Generator for Windows written in Python⛤☆54Updated 2 years ago
- Create a fully undetectable backdoor with simple steps.☆74Updated 3 years ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆48Updated last year
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆261Updated 4 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆61Updated 4 years ago
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆88Updated 9 months ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆42Updated 2 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆133Updated last year
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆19Updated 3 years ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆108Updated last year
- (Windows/Linux/Mac) Remote Administration Tool☆65Updated 4 years ago
- A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules…☆126Updated last month
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆68Updated 2 years ago
- A reverse TCP payload and listener both written in python3.☆30Updated last year
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.☆53Updated last year
- An easy to handle hacking script, SSH Forcebrute, FTP Forcebrute and many others features☆65Updated 3 years ago
- Rogue access point tool.☆59Updated 3 years ago
- Simple script masks the phishing link under the normal URL☆84Updated 4 years ago
- BruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack☆47Updated 6 years ago
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆187Updated 2 months ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆70Updated 2 years ago
- Phising 2FA Gmail☆100Updated 3 years ago