☆13Oct 12, 2022Updated 3 years ago
Alternatives and similar repositories for pegasusrat
Users that are interested in pegasusrat are comparing it to the libraries listed below
Sorting:
- AI designed for cybersecurity professionals, ethical hackers, Malware, and penetration testers. It assists in vulnerability analysis, sec…☆17Dec 26, 2025Updated 2 months ago
- ☆14Feb 21, 2025Updated last year
- A powerful Discord nuke bot written on Go☆10Jul 20, 2024Updated last year
- This is my own custom fork of Bhassani's original repo, which contains the (unfinished) reverse-engineered WannaCry Ransomware-related fi…☆10Mar 7, 2023Updated 3 years ago
- bot net ufonet con ia☆12Jul 7, 2024Updated last year
- Logs the I.P address(IPv4) of the device present on LAN and performs OS guessing .☆10Apr 24, 2022Updated 3 years ago
- Free Reporter Telegram! Open-Source☆14Apr 3, 2025Updated 11 months ago
- rockyou.txt the famous wordlist for password cracking☆32Apr 7, 2025Updated 11 months ago
- C2 frameworks for RTO, server and implants for stealth red-teaming mode.☆13Sep 11, 2024Updated last year
- ☆14Feb 19, 2026Updated 2 weeks ago
- Collection of Windows kernel driver examples, offering insights into Windows internals, rootkit evasion, and advanced driver development.☆12Nov 23, 2023Updated 2 years ago
- HackerGPT is an advanced AI designed for cybersecurity professionals, ethical hackers , MalWare, and penetration testers. It assists in v…☆16Feb 20, 2026Updated 2 weeks ago
- 🔱 Ronin the Shogun, WebApp parameter analysis and fuzzer for XSS and SSRF.☆14Sep 8, 2024Updated last year
- A comprehensive reconnaissance and vulnerability scanning tool that combines multiple security assessment capabilities into a single auto…☆26Jun 24, 2025Updated 8 months ago
- keep watching new bug bounty (vulnerability) postings.☆13Apr 7, 2024Updated last year
- A barebones API☆15Apr 8, 2015Updated 10 years ago
- ☆15Apr 12, 2024Updated last year
- All API Endpoints for the Nike Minimalist Fashion App☆15Mar 27, 2017Updated 8 years ago
- A guide on how to embed a tracking image into an email for investigation purposes☆19Feb 23, 2020Updated 6 years ago
- Radio frequency cybersecurity architech research, based on latest severe damage to privacy or modify wireless devices.☆16Sep 11, 2024Updated last year
- ☆18Apr 26, 2025Updated 10 months ago
- Web Application Vulnerability Scanner☆19Oct 18, 2018Updated 7 years ago
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆18Jul 16, 2024Updated last year
- SpeedyTest☆17Jun 21, 2023Updated 2 years ago
- Indirect Syscall invocation via thread hijacking☆26May 5, 2023Updated 2 years ago
- Python Backdoor Obfusctor, Encrypter and Encoder☆18Nov 5, 2018Updated 7 years ago
- Plugin Driven Remote Administration Tool (Unsupported)☆14Sep 23, 2015Updated 10 years ago
- Generate Virus in Termux. Z Virus is a Collection of Ready Made Viruses which you can send to your victim using link. Those who don't kno…☆15Dec 31, 2020Updated 5 years ago
- OSINT Intelligence Tool☆64Dec 7, 2025Updated 3 months ago
- Software Update for Embedded Systems☆19Oct 29, 2021Updated 4 years ago
- SQLMap with Autonomous AI, phased workflows, RAG memory, and MCP Agent Tools☆76Feb 26, 2026Updated last week
- A shellcode crypto-packing tool for PoC (used with msfvenom payloads)☆17Feb 10, 2023Updated 3 years ago
- This script can DDOS as Layer 7 GET & POST Method , Fast And Easy , PowerFul Doser Tool !☆18Aug 22, 2022Updated 3 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- ☆22Sep 29, 2022Updated 3 years ago
- Working exploit code for CVE-2019-17625☆19Mar 12, 2020Updated 5 years ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- A simple video editor for trimming and resizing clips.☆24Feb 6, 2024Updated 2 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago