☆11May 13, 2025Updated 11 months ago
Alternatives and similar repositories for Millenium-RAT
Users that are interested in Millenium-RAT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 🌐A new VBS binder generator for running your non-crypted builds without being detected by Windows Defender. You can read about how exact…☆23May 22, 2025Updated 10 months ago
- Shellcode Loader Library.☆15Sep 21, 2025Updated 6 months ago
- This is an advanced ASMI bypass that is currently undetected by Windows Defender and all the Antivirus software's on virustotal.☆26Jun 10, 2025Updated 10 months ago
- NCrypt portable crypter is a collection of C++ build tools, a tiny C compiler for the stub, and a useful codebase for anyone wanting to c…☆17Mar 14, 2024Updated 2 years ago
- A simple script to obfuscate batch(bat) code easily☆26Oct 21, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- 🤖 ☠️ 💬 A simple Telegram Bot that controls the victim's computer.☆45Sep 20, 2025Updated 6 months ago
- Remote Access Tool for Windows.☆85Nov 14, 2022Updated 3 years ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆155May 22, 2025Updated 10 months ago
- RunPE implementation with multiple evasive techniques (2)☆280Sep 25, 2025Updated 6 months ago
- A rust library that allows you to host the CLR and execute dotnet binaries.☆235Mar 12, 2025Updated last year
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆551Jun 3, 2025Updated 10 months ago
- 助力红队成员一键生成免杀木马,使用rust实现 | Help Redteam members generate Evasive Anti-virus software Trojan☆619Aug 7, 2024Updated last year
- An offensive data enrichment pipeline☆949Apr 2, 2026Updated last week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Ready to go Phishing Platform☆1,123May 6, 2025Updated 11 months ago
- A simple remote tool in C#.☆998Feb 7, 2022Updated 4 years ago
- LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)☆1,130Jun 24, 2019Updated 6 years ago
- Bypass Chromium's App-Bound Encryption via Direct Syscall-based Reflective Process Hollowing. Extract cookies, passwords, payment methods…☆1,521Feb 9, 2026Updated 2 months ago
- jSQL Injection is a Java application for automatic SQL database injection.☆1,756Mar 27, 2026Updated 2 weeks ago
- AdaptixC2 is a highly modular advanced redteam toolkit☆2,969Mar 22, 2026Updated 3 weeks ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆3,053May 13, 2024Updated last year
- Automated NoSQL database enumeration and web application exploitation tool.☆3,263Feb 20, 2026Updated last month
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,532Jun 10, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆3,577Jul 31, 2024Updated last year
- PowerShell Obfuscator☆4,233Aug 10, 2023Updated 2 years ago
- Red Teaming Tactics and Techniques☆4,549Aug 22, 2024Updated last year
- Trying to tame the three-headed dog.☆4,960Nov 14, 2025Updated 5 months ago
- Accurately Locate Smartphones using Social Engineering☆9,218May 7, 2025Updated 11 months ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,561Oct 16, 2025Updated 5 months ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,133Mar 17, 2024Updated 2 years ago
- A swiss army knife for pentesting networks☆9,117Dec 6, 2023Updated 2 years ago
- Adversary Emulation Framework☆10,986Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- In-depth attack surface mapping and asset discovery☆14,398Apr 7, 2026Updated last week
- Web path scanner☆14,171Mar 16, 2026Updated 3 weeks ago
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,896Updated this week
- Cheatsheets for experienced React developers getting started with TypeScript☆47,020Feb 13, 2026Updated 2 months ago
- Metasploit Framework☆37,906Updated this week
- The library for web and native user interfaces.☆244,441Updated this week
- A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.☆214,435Nov 19, 2024Updated last year