A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.
☆19Jun 22, 2023Updated 2 years ago
Alternatives and similar repositories for SyncRAT
Users that are interested in SyncRAT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- All Type Of Tools written in multipule language .☆22Oct 23, 2022Updated 3 years ago
- Proof of Concept of CVE-2022-30190☆38Oct 6, 2022Updated 3 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆16Aug 4, 2023Updated 2 years ago
- A Web Vulnerability Scanner and Patcher☆172Feb 14, 2026Updated 2 months ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 6 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Educational lab project exploring secure remote session design, authentication flows, logging, and detection considerations. Built for de…☆175Jul 22, 2023Updated 2 years ago
- ☆13Sep 8, 2024Updated last year
- Pegasus Is A Tool Wich Has 9 Functions. Pegasus Uses Discord as C2.☆17Jan 12, 2023Updated 3 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Oct 21, 2023Updated 2 years ago
- Plunge into the depths of the web with Linkscraper! Uncover links, images, emails, and more swiftly, catering to researchers, developers,…☆11Nov 9, 2024Updated last year
- POC OF CVE-2022-21970☆14Oct 20, 2022Updated 3 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- NoSecerets is a python script that is designed to crack hashes extremely fast. Faster even than Hashcat☆11Mar 13, 2022Updated 4 years ago
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- POC Of CVE-2022-21971☆11Oct 7, 2022Updated 3 years ago
- POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.☆17Jun 18, 2025Updated 10 months ago
- ☆14Aug 25, 2023Updated 2 years ago
- Cerberos Is A Tool Wich Has Over 50+ Functions. Cerberos Uses Discord as C2.☆17Jan 7, 2023Updated 3 years ago
- An x64 assembly implementation of essential data structures and algorithms for DSA.☆16Jun 4, 2023Updated 2 years ago
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated 2 years ago
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- Red Team list and cheat sheets☆11Jul 7, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- POC Of CVE-2022-26937☆14Oct 7, 2022Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 6 years ago
- Really useful hacking tools.☆19Dec 16, 2023Updated 2 years ago
- Locate device location using Social engineering☆18Sep 30, 2022Updated 3 years ago
- web based c2 🏴☠️☆15Aug 10, 2024Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 6 years ago
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- A POC of CVE-2022-30206☆15Sep 26, 2022Updated 3 years ago
- A network analysis tool that works together with snort to visually represent a PROFINET network graph.☆17May 17, 2016Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A Ransomware Based in AES256 Algorithm☆17Jul 28, 2022Updated 3 years ago
- ☆38Apr 1, 2024Updated 2 years ago
- Bypass http 403 🐏☆16Feb 26, 2022Updated 4 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆23Aug 21, 2023Updated 2 years ago
- AzureAD Pentest☆25Mar 24, 2022Updated 4 years ago
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Oct 20, 2025Updated 6 months ago
- Network/host scanner and information gatherer☆25Oct 21, 2023Updated 2 years ago