A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.
☆19Jun 22, 2023Updated 2 years ago
Alternatives and similar repositories for SyncRAT
Users that are interested in SyncRAT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof of Concept of CVE-2022-30190☆38Oct 6, 2022Updated 3 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆16Aug 4, 2023Updated 2 years ago
- POC of CVE-2022-36537☆36Jun 18, 2025Updated 9 months ago
- A Web Vulnerability Scanner and Patcher☆171Feb 14, 2026Updated last month
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- Educational lab project exploring secure remote session design, authentication flows, logging, and detection considerations. Built for de…☆177Jul 22, 2023Updated 2 years ago
- Lucifer is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python.☆25Jun 30, 2022Updated 3 years ago
- VM Escape for Parallels Desktop <18.1.1☆37May 7, 2023Updated 2 years ago
- ☆13Sep 8, 2024Updated last year
- Pegasus Is A Tool Wich Has 9 Functions. Pegasus Uses Discord as C2.☆15Jan 12, 2023Updated 3 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Oct 21, 2023Updated 2 years ago
- Plunge into the depths of the web with Linkscraper! Uncover links, images, emails, and more swiftly, catering to researchers, developers,…☆11Nov 9, 2024Updated last year
- POC OF CVE-2022-21970☆14Oct 20, 2022Updated 3 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.☆17Jun 18, 2025Updated 9 months ago
- ☆12Aug 25, 2023Updated 2 years ago
- Cerberos Is A Tool Wich Has Over 50+ Functions. Cerberos Uses Discord as C2.☆17Jan 7, 2023Updated 3 years ago
- Movie Recommendation System based on machine learning concepts☆10Sep 21, 2023Updated 2 years ago
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated 2 years ago
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- Red Team list and cheat sheets☆11Jul 7, 2024Updated last year
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- Really useful hacking tools.☆19Dec 16, 2023Updated 2 years ago
- Locate device location using Social engineering☆18Sep 30, 2022Updated 3 years ago
- web based c2 🏴☠️☆15Aug 10, 2024Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- ☆53Jul 22, 2023Updated 2 years ago
- Digital Artefact Extraction Tool for Discord Application☆12Apr 13, 2023Updated 2 years ago
- ☆38Apr 1, 2024Updated last year
- Bypass http 403 🐏☆16Feb 26, 2022Updated 4 years ago
- AzureAD Pentest☆25Mar 24, 2022Updated 4 years ago
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Oct 20, 2025Updated 5 months ago
- ☆12Jun 4, 2025Updated 9 months ago
- Network/host scanner and information gatherer☆25Oct 21, 2023Updated 2 years ago
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆263Aug 19, 2025Updated 7 months ago
- Personal notes from Red teamer for Blue/Red/Purple.☆57Feb 9, 2024Updated 2 years ago
- The Clipboard Hijacker Payload aims to monitor, capture, and potentially manipulate clipboard data on a target machine.☆32Nov 7, 2024Updated last year