Exploit-install / TheFatRatLinks
An easy tool to generate backdoor with msfvenom (a part from metasploit framework). This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection
☆132Updated 9 years ago
Alternatives and similar repositories for TheFatRat
Users that are interested in TheFatRat are comparing it to the libraries listed below
Sorting:
- Make a 100% FUD Android Trojan and Bypass All Anti-Viruses + Android Google Play Protector☆101Updated last month
- Using open Adb ports we can exploit a devive☆99Updated 4 years ago
- Undetectable helps you to generate fully undetectable payload of metasploit which can bypass android antivirus.☆109Updated 2 years ago
- Automated Payload Generator Tool☆108Updated 5 years ago
- A Hackers framework☆161Updated 8 years ago
- Advanced MSF Payload Generator tool for Linux☆99Updated 8 months ago
- Samples Phishing tools made for Linux it contains 30 different type of Phishing Pages made with flask☆107Updated 3 years ago
- ☆71Updated 2 years ago
- A Bloody RAT, is software that gives a person full control of a tech device, remotely.☆79Updated 3 years ago
- Shellphish is created by TheLinuxChoice but after the repository deleted we recreate this. To know how to use shellphish visit our websit…☆96Updated 5 years ago
- Androspy framework is a Backdoor Crypter & Creator with Automatic IP Poisener☆261Updated 7 years ago
- Simple script masks the phishing link under the normal URL☆87Updated 4 years ago
- Using this Apk-Binder tool or script you can embed the metasploit payload or backdoor with apk files.☆82Updated 5 years ago
- Make custom phishing page with Black-Water you just need to put required in create folder.☆36Updated 5 years ago
- Phishing Tool For Advanced Instagram Copyright Infringement Attack☆82Updated 2 years ago
- 888 RAT Pro Options : File Manager Remote Desktop Web cam capture Sound capture Get password (all last browser 2 met…☆84Updated 2 years ago
- Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .o…☆112Updated 3 years ago
- Wordlist générator, router flood and Wifi Cracker☆52Updated 5 years ago
- Script to generate Android App that can hijack autenticated sessions in cookies☆190Updated 6 years ago
- PowerFull Administration Tool For Linux☆188Updated 8 years ago
- ☆86Updated 7 years ago
- Python wordlist generator☆177Updated 3 years ago
- Skeleton is a Social Engineering tool attack switcher☆73Updated 5 years ago
- Run interactive android exploits in linux.☆147Updated 9 months ago
- Social Engineering Toolkit☆124Updated 3 years ago
- CCTV & Webcam Hacking☆155Updated 6 months ago
- A router Sploit is the core of anyone's internet experience, but sadly most people don't spend much time setting up this critical piece o…☆58Updated 3 years ago
- DarkSploit Framework☆94Updated 4 years ago
- Python Script for Email Bombing which supports Gmail, Yahoo, Hotmail/Outlook☆138Updated 4 years ago
- Toolkit Hacking☆71Updated 2 years ago