H4xl0r / SpyBoxRatView external linksLinks
Remote Access Tool written in VBNET
☆17Sep 8, 2020Updated 5 years ago
Alternatives and similar repositories for SpyBoxRat
Users that are interested in SpyBoxRat are comparing it to the libraries listed below
Sorting:
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- This is a Rubber Ducky script that downloads an executable file externally while bypassing Windows antivirus and added to the exclusions …☆15Jul 29, 2021Updated 4 years ago
- ☆16Jan 12, 2022Updated 4 years ago
- Some simple scripts that I use during bug bounty hunting in Android Apps☆28Jan 30, 2025Updated last year
- This utility smart contact can be used to build DAPP which can lock LP Tokens or any BEP20 or ERC20 Tokens (Depends on deployment chain) …☆11Sep 30, 2021Updated 4 years ago
- Cool stealer for Windwos. Cold wallet, VPN, Browsers, File, FileZila and etc Крутой стиллер для Windwos. Крипто кошельки, ВПН, Файлы с ра…☆15May 22, 2022Updated 3 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- Discover hidden information on the web with "Elite Google Dorks Search by Biscuit." This collection offers smart and improved Google sear…☆19Aug 10, 2025Updated 6 months ago
- Take control of a remote machine using reverse shells in python(The hacking side of python)☆10May 23, 2023Updated 2 years ago
- Python based Web Scraper which can discover JavaScript files and parse them for juicy information (API keys, IP's, Hidden Paths etc)☆16Feb 17, 2022Updated 3 years ago
- An MITM based Social Engineering (Phishing)attack POC!☆10Mar 25, 2014Updated 11 years ago
- u-blox Linux Kernel repository☆12Jan 29, 2016Updated 10 years ago
- 🧿Join your two exe files☆11Jul 14, 2020Updated 5 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Aug 4, 2021Updated 4 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- Source code of WeLeakInfo.☆10Jul 31, 2020Updated 5 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- Attempt to grind out the 100 offsec project challenges, conceptualized by github user, @kurogai, at his repo [https://github.com/kurogai/…☆15Jul 16, 2024Updated last year
- Public Exploits☆10Apr 6, 2021Updated 4 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆20May 17, 2023Updated 2 years ago
- Various scripts & tools☆12Apr 22, 2024Updated last year
- Bypassing windows uac, however its an old approach/method but its still unpatched ¯\_(ツ)_/¯☆44Nov 17, 2021Updated 4 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- Fast scanner for exposed env files☆14Nov 14, 2022Updated 3 years ago
- Shellcode loader with evasion capabilities written in Nim☆14Jan 25, 2025Updated last year
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- DeFi , Farming and Staking ecosystem☆10Nov 15, 2020Updated 5 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, website…☆14Aug 23, 2022Updated 3 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Parameter-Reflect-Finder is a python based tool that helps you find reflected parameters which can have potential XSS or Open redirection…☆16Aug 8, 2022Updated 3 years ago
- ☆12Jun 16, 2021Updated 4 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago
- A simple Impacket-based tool to check a set of credentials against many Windows hosts and get permission for SMB shares.☆13Dec 26, 2025Updated last month
- Red Teaming with Kali Linux. OS Customization, additional tools, and automated updates☆13Aug 7, 2016Updated 9 years ago
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆17Mar 23, 2025Updated 10 months ago
- ☆11Jun 19, 2024Updated last year
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago