Marten4n6 / EvilOSX
An evil RAT (Remote Administration Tool) for macOS / OS X.
☆2,307Updated 4 years ago
Alternatives and similar repositories for EvilOSX:
Users that are interested in EvilOSX are comparing it to the libraries listed below
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,400Updated 6 years ago
- iOS/macOS/Linux Remote Administration Tool☆1,679Updated 3 years ago
- Python Remote Administration Tool (RAT)☆3,208Updated last year
- Undetectable Windows Payload Generation☆1,576Updated 2 years ago
- Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor a…☆1,095Updated 2 years ago
- LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)☆1,071Updated 5 years ago
- CHAOS is a free and open-source Remote Administration Tool that allow generate binaries to control remote operating systems.☆2,438Updated 3 months ago
- AntiVirus Evasion Tool☆1,679Updated last year
- HTTP Botnet☆891Updated 4 years ago
- An Python Script For Generating Payloads that Bypasses All Antivirus so far .☆967Updated last year
- Python botnet and backdoor☆1,570Updated last year
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,583Updated 10 months ago
- Python antivirus evasion tool☆1,403Updated last year
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,349Updated 4 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,786Updated last year
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,135Updated 3 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,261Updated 4 months ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆1,338Updated last year
- Veil Evasion is no longer supported, use Veil 3.0!☆1,834Updated 3 years ago
- RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware☆897Updated 3 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,055Updated last year
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,341Updated last year
- Efficient and advanced man in the middle framework☆2,073Updated last year
- Know the dangers of credential reuse attacks.☆2,043Updated 4 months ago
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆909Updated 5 years ago
- Python Remote Administration Tool (RAT) to gain meterpreter session☆602Updated 3 months ago
- ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication☆990Updated last year
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,132Updated 4 years ago
- Windows Remote-Access-Trojan☆644Updated 8 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆9,706Updated 11 months ago