ErAz7 / NinjaLinks
A general-purpose fully customizable software to control a remote computer behind any NAT, Firewall and proxy. Providing secure shell access, file transfer and shell stream (stream shell output from remote to a local file). Ninja has no prerequisites, you can just download the release and use it right away!
☆41Updated 3 years ago
Alternatives and similar repositories for Ninja
Users that are interested in Ninja are comparing it to the libraries listed below
Sorting:
- A fully customizable CLI application to coummunicate with and send commands to Ninja running behind any NAT, firewall and proxy! Providin…☆27Updated 3 years ago
- The purpose of this tool is to test the window10 defender protection and also other antivirus protection.☆93Updated 2 years ago
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆27Updated last year
- Create a fully undetectable backdoor with simple steps.☆76Updated 3 years ago
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆227Updated last year
- ⛤Keylogger Generator for Windows written in Python⛤☆55Updated 2 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆135Updated last year
- steal chrome saved passwords "undetectable"☆51Updated 3 years ago
- Simple script masks the phishing link under the normal URL☆85Updated 4 years ago
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆168Updated 2 years ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆263Updated 4 years ago
- Advance mitm attack using fake access point☆132Updated 2 years ago
- DragonMS is Tools for ddos, scanner, tracker, payload generator msfvenom and scraping☆80Updated 3 years ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆48Updated 2 years ago
- Rogue access point tool.☆59Updated 3 years ago
- Find exploits in local and online database☆79Updated 11 months ago
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆122Updated last year
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆189Updated 4 months ago
- Arbitrium is a cross-platform, fully undetectable remote access trojan, to control Android, Windows and Linux and doesn't require any fir…☆366Updated 4 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆42Updated 3 years ago
- Fully Undetectable telegram Rat dropper☆37Updated 4 years ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆72Updated 2 years ago
- (Windows/Linux/Mac) Remote Administration Tool☆67Updated 4 years ago
- Big-Papa is a remote cookie stealer which can then be used for session hijacking and Bypassing 2 Factor Authentication☆104Updated 3 years ago
- A reverse TCP payload and listener both written in python3.☆31Updated last year
- Easy to understand back door written in python☆35Updated 3 years ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆110Updated 2 years ago
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.☆54Updated last year
- Learn how to set up a fake authentication web page on a fake WiFi network.☆113Updated 2 years ago
- Simple program to steal private files from removable storages☆88Updated 3 years ago