HYPER12755 / ULTIMATE-RAT-COLLECTIONLinks
There is a collection of 500+ rats here. Remote-administration-tools-archive
☆18Updated last week
Alternatives and similar repositories for ULTIMATE-RAT-COLLECTION
Users that are interested in ULTIMATE-RAT-COLLECTION are comparing it to the libraries listed below
Sorting:
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆422Updated last month
- Heavily obfuscated PowerShell reverse shell that can bypass Windows Defender☆23Updated 8 months ago
- PDF dropper Red Team Scenairos☆221Updated last year
- Pure Malware Development Resource Collections☆373Updated 8 months ago
- Embed a payload inside a PNG file☆348Updated 11 months ago
- Malware Development for Ethical Hackers, published by Packt☆376Updated 9 months ago
- This is for Ethical Use only.☆432Updated 4 months ago
- EDR & Antivirus Bypass to Gain Shell Access☆245Updated 11 months ago
- Persistent Powershell backdoor tool {😈}☆120Updated last year
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆42Updated last year
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆379Updated last week
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆439Updated last year
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆333Updated 6 months ago
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advance…☆558Updated 4 months ago
- POC exploit for CVE-2024-49138☆255Updated 7 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆413Updated 8 months ago
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.☆832Updated last year
- ☆402Updated 9 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆187Updated 6 months ago
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆425Updated last year
- An Ounce Antler Bullet [CVSS:3.1] & EoP [220066255]. Penetrate iOS and Android☆207Updated last year
- Extract and execute a PE embedded within a PNG file using an LNK file.☆446Updated 10 months ago
- Repo containing cracked red teaming tools.☆191Updated last month
- BrowserSnatch is a powerful browser stealer or browser data extraction tool intended to be used for ethical hacking or penetration testin…☆274Updated 5 months ago
- Complete list of LPE exploits for Windows (starting from 2023)☆832Updated last month
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆568Updated last year
- An List of my Powershell scripts, commands and Blogs for windows Red Teaming.☆445Updated 7 months ago
- MiniEDR is a kernel-mode process monitor that logs creations & terminations via a named pipe. Built for research & learning, exploring Wi…☆16Updated 7 months ago
- Evasive shellcode loader☆385Updated 11 months ago
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆29Updated 2 years ago