HYPER12755 / ULTIMATE-RAT-COLLECTIONLinks
For educational purpose only.There is a collection of 500+ rats here. Remote-administration-tools-archive.analyze them in a insolated environment like VM. don't run directly into your device
☆26Updated 2 weeks ago
Alternatives and similar repositories for ULTIMATE-RAT-COLLECTION
Users that are interested in ULTIMATE-RAT-COLLECTION are comparing it to the libraries listed below
Sorting:
- Android remote administration tool☆641Updated 2 weeks ago
- Shellcode Loader Library.☆13Updated 2 months ago
- Next-Gen Stealer written in Go. Stealing from Chromium-Based & Firefox-Based Browsers, Crypto Wallets and more, from every user on every …☆17Updated 3 months ago
- Repo containing cracked red teaming tools.☆208Updated 3 weeks ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆92Updated 9 months ago
- 🦎Triton_RAT is free and easy to use, one of the best remote administration tools written in Python, fully integrated with Telegram🦎☆69Updated 2 months ago
- Spearphishing tools, generate masqueraded pocket executable☆106Updated 2 years ago
- PDF dropper Red Team Scenairos☆226Updated last year
- Heavily obfuscated PowerShell reverse shell that can bypass Windows Defender☆23Updated 10 months ago
- Cross-Platform Android Remote Administration Tool | Official maintained repository for the AhMyth R.A.T Project | A dedicated revival of …☆1,119Updated 2 weeks ago
- ☆129Updated last year
- ObfuXtreme is an advanced Python obfuscation tool designed to bypass antivirus detection and remain undetectable on VirusTotal.☆184Updated last week
- Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions☆406Updated 2 months ago
- VenomRAT-HVNC 5.6, this is the latest version with a working HVNC module !☆158Updated 2 years ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆128Updated 7 months ago
- Adversarial frameworks for Android and iOS sandbox evasion.☆221Updated last year
- Tool to evade Antivirus With Different Techniques☆192Updated 2 years ago
- Embed a payload inside a PNG file☆360Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆449Updated 3 months ago
- This is for Ethical Use only. The default automated binaries created are all burned. I have added the script to the repo to modify certai…☆442Updated 6 months ago
- PounceKey's is a Accessibility Service keylogger for Android 5 to 15! full launcher stealth. choose between receiving logs via IP, Gmail,…☆357Updated 2 months ago
- An automated tool kit that clones sites and builds malicious javascript , deploys public Tunneling and send info through telegram Bot☆58Updated 8 months ago
- CraxsRat is a sophisticated Android remote access trojan (RAT) that grants cybercriminals extensive control over infected devices. It is …☆172Updated 6 months ago
- Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088☆43Updated 3 months ago
- Here are +200 different rats some with source code☆126Updated 2 years ago
- Next-Gen Stealer written in Go. Stealing from Discord, Chromium-Based & Firefox-Based Browsers, Crypto Wallets and more, from every user…☆387Updated 11 months ago
- POC exploit for CVE-2024-49138☆265Updated 9 months ago
- BrowserSnatch is a powerful browser stealer or browser data extraction tool intended to be used for ethical hacking or penetration testin…☆284Updated last week
- xworm rce. allows you to run powershell on xworm c2s☆19Updated 2 months ago
- BEERUS Framework for Android☆346Updated 2 months ago