ErAz7 / NinjaLinks
A general-purpose fully customizable software to control a remote computer behind any NAT, Firewall and proxy. Providing secure shell access, file transfer and shell stream (stream shell output from remote to a local file). Ninja has no prerequisites, you can just download the release and use it right away!
☆41Updated 2 years ago
Alternatives and similar repositories for Ninja
Users that are interested in Ninja are comparing it to the libraries listed below
Sorting:
- A fully customizable CLI application to coummunicate with and send commands to Ninja running behind any NAT, firewall and proxy! Providin…☆27Updated 2 years ago
- The purpose of this tool is to test the window10 defender protection and also other antivirus protection.☆93Updated last year
- Advance mitm attack using fake access point☆131Updated 2 years ago
- Create a fully undetectable backdoor with simple steps.☆74Updated 3 years ago
- Fully Undetectable telegram Rat dropper☆35Updated 4 years ago
- Fast exploitation based on metasploit.☆74Updated 5 years ago
- ⛤Keylogger Generator for Windows written in Python⛤☆53Updated 2 years ago
- BruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack☆47Updated 6 years ago
- (Windows/Linux/Mac) Remote Administration Tool☆64Updated 4 years ago
- Steal All Browser Credentials Via BasUSB Attack In 5 Seconds.☆57Updated 3 years ago
- WH-ApkCrypter-V2 100% bypass 2020☆43Updated last year
- FUD metasploit Persistence RAT☆4Updated 2 years ago
- Find exploits in local and online database☆75Updated 8 months ago
- reverse shell + keylogger + wifis password stealing + screen sharing + camera sharing☆29Updated 4 years ago
- Windows Hacking FrameWork using Reverse Shell☆105Updated 2 months ago
- steal chrome saved passwords "undetectable"☆50Updated 3 years ago
- The Advanced Automated Pen testing And Forensics Tool NoJle built using python it's for lazy hackers to automate most used Linux commands…☆42Updated 3 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆42Updated 2 years ago
- Python script to perform phishing attacks through captive portals, made for learning purposes☆51Updated 2 years ago
- A reverse TCP payload and listener both written in python3.☆30Updated last year
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.☆52Updated last year
- Rogue access point tool.☆59Updated 2 years ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆69Updated 2 years ago
- This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it bat…☆50Updated 4 years ago
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆18Updated 3 years ago
- Ro3b - Advance Banking HTTP Botnet☆49Updated last year
- Simple script masks the phishing link under the normal URL☆83Updated 4 years ago
- ☆19Updated 6 years ago
- Extension spoofer and reverse shell generator☆11Updated 5 years ago
- blackhole is a ransomware coded in c#☆27Updated 5 years ago