ErAz7 / NinjaLinks
A general-purpose fully customizable software to control a remote computer behind any NAT, Firewall and proxy. Providing secure shell access, file transfer and shell stream (stream shell output from remote to a local file). Ninja has no prerequisites, you can just download the release and use it right away!
☆41Updated 2 years ago
Alternatives and similar repositories for Ninja
Users that are interested in Ninja are comparing it to the libraries listed below
Sorting:
- A fully customizable CLI application to coummunicate with and send commands to Ninja running behind any NAT, firewall and proxy! Providin…☆27Updated 2 years ago
- The purpose of this tool is to test the window10 defender protection and also other antivirus protection.☆93Updated last year
- 🌐🔍 Red Network Tool is a tool for network exploration and info finding.☆40Updated 3 years ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆69Updated 2 years ago
- steal chrome saved passwords "undetectable"☆50Updated 3 years ago
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.☆52Updated last year
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆18Updated 3 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆109Updated 2 years ago
- An Automated Database Hacking Software with Database Dorks Hacking☆30Updated 5 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Updated last year
- Find exploits in local and online database☆75Updated 8 months ago
- Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.☆74Updated 2 years ago
- Red Team scripts written in python☆17Updated 2 years ago
- Advance mitm attack using fake access point☆131Updated 2 years ago
- BruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack☆47Updated 6 years ago
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆87Updated 7 months ago
- Smart pentesting toolkit for modern WPA/WPA2 networks ⚔️📡☆28Updated 4 years ago
- ☆19Updated 6 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- DragonMS is Tools for ddos, scanner, tracker, payload generator msfvenom and scraping☆78Updated 3 years ago
- The Advanced Automated Pen testing And Forensics Tool NoJle built using python it's for lazy hackers to automate most used Linux commands…☆42Updated 3 years ago
- Create a fully undetectable backdoor with simple steps.☆74Updated 3 years ago
- An OSINT focused tool made with Nodejs!☆93Updated 2 years ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆48Updated last year
- Python script to automatically steal all the files and information from a computer using an USB device. Created just for educational purp…☆43Updated last month
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆42Updated 2 years ago
- Fast exploitation based on metasploit.☆74Updated 5 years ago
- (Windows/Linux/Mac) Remote Administration Tool☆64Updated 4 years ago
- This tool will create a .exe file which will send you all the information of victim once the file executes!☆35Updated 6 months ago
- 📦 Wireless Attacks Tools 🕷️☆71Updated last year