ErAz7 / NinjaLinks
A general-purpose fully customizable software to control a remote computer behind any NAT, Firewall and proxy. Providing secure shell access, file transfer and shell stream (stream shell output from remote to a local file). Ninja has no prerequisites, you can just download the release and use it right away!
☆39Updated 3 years ago
Alternatives and similar repositories for Ninja
Users that are interested in Ninja are comparing it to the libraries listed below
Sorting:
- A fully customizable CLI application to coummunicate with and send commands to Ninja running behind any NAT, firewall and proxy! Providin…☆26Updated 3 years ago
- The purpose of this tool is to test the window10 defender protection and also other antivirus protection.☆94Updated 2 years ago
- Create a fully undetectable backdoor with simple steps.☆77Updated 3 years ago
- ⛤Keylogger Generator for Windows written in Python⛤☆55Updated 2 years ago
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆28Updated 2 years ago
- A reverse TCP payload and listener both written in python3.☆30Updated last year
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆43Updated 3 years ago
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆238Updated last year
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆137Updated 2 years ago
- steal chrome saved passwords "undetectable"☆51Updated 3 years ago
- Simple script masks the phishing link under the normal URL☆87Updated 5 years ago
- (Windows/Linux/Mac) Remote Administration Tool☆66Updated 4 years ago
- Windows Hacking FrameWork using Reverse Shell☆108Updated 10 months ago
- Easy to understand back door written in python☆36Updated 3 years ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆47Updated 2 years ago
- BruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack☆56Updated 6 years ago
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆189Updated 9 months ago
- Automated rogue access point setup tool.☆201Updated 4 years ago
- Rogue access point tool.☆57Updated 3 years ago
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆19Updated 3 years ago
- Fully Undetectable telegram Rat dropper☆35Updated 5 years ago
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆142Updated 5 years ago
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆123Updated 2 years ago
- Fake Mailer is a PHP Email Spoofer which is capable of sending spoofed or tampered emails to the target. No Need to Sign up, Send Email A…☆84Updated 2 years ago
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆91Updated 2 months ago
- Python script to perform phishing attacks through captive portals, made for learning purposes☆56Updated 3 years ago
- Big-Papa is a remote cookie stealer which can then be used for session hijacking and Bypassing 2 Factor Authentication☆105Updated 3 years ago
- PhishX - The Complete Spear Phishing Tool☆110Updated 7 years ago
- WH-ApkCrypter-V2 100% bypass 2020☆42Updated 2 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆69Updated 4 years ago