HalilDeniz / CryptoChat
CryptChat: Beyond Secure Messaging π‘οΈ
β67Updated last year
Alternatives and similar repositories for CryptoChat:
Users that are interested in CryptoChat are comparing it to the libraries listed below
- Here are +200 different rats some with source codeβ83Updated last year
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)β100Updated last year
- PassBreakerβ55Updated 9 months ago
- BackdoorSim: An Educational into Remote Administration Toolsβ100Updated 11 months ago
- Kali Packerge Managerβ56Updated last year
- PacketSpyβ135Updated 7 months ago
- Mass bruteforce authentication of network protocolsβ45Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversionsβ65Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.β106Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pagβ¦β122Updated last year
- ProxyChecker Made in NodeJSβ37Updated 2 years ago
- Persistent Powershell backdoor tool {π}β111Updated 5 months ago
- POC Pdf-exploit builder on C#β129Updated 10 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filterβ93Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.β61Updated 4 months ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the Fβ¦β26Updated last year
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP filesβ114Updated 7 months ago
- β60Updated 8 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionalityβ50Updated last year
- NetProbe: Network Probeβ152Updated 3 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β59Updated 10 months ago
- This is for Ethical Use only!β19Updated this week
- A C2 framework built for my bachelors thesisβ55Updated 2 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.β40Updated 7 months ago
- Limbo is a Python-based malware that collects sensitive data from a user's computer, such as passwords and system information. It is intβ¦β46Updated 9 months ago
- LNK-Dropper Builderβ17Updated 3 months ago
- Jasmin ransomware web panel path traversal PoCβ21Updated 9 months ago
- A command and control (C2) serverβ56Updated 6 months ago