PowerFull Administration Tool For Linux
☆193Oct 4, 2017Updated 8 years ago
Alternatives and similar repositories for FatRat
Users that are interested in FatRat are comparing it to the libraries listed below
Sorting:
- ☆17Jul 26, 2018Updated 7 years ago
- Simple Antivirus☆10Dec 24, 2016Updated 9 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- XLOCK Is a light, and powerful file locker that with features such as an interactive file interface, work in-progress shell with commands…☆13Jan 10, 2019Updated 7 years ago
- D-RAT SRC Extract☆12Dec 24, 2016Updated 9 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- A Linux RAT in C☆33Oct 29, 2018Updated 7 years ago
- ☆22Aug 28, 2023Updated 2 years ago
- ZeroRemote Trojan SRC Extract☆19Mar 1, 2017Updated 9 years ago
- Talos Decryptor POC for Remcos RAT version 2.0.5 and earlier☆24Aug 2, 2018Updated 7 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,052Mar 17, 2024Updated last year
- ☆1,070Jan 13, 2023Updated 3 years ago
- ☆34Jul 23, 2018Updated 7 years ago
- Experimental examples of Ransomware in different languages☆37Nov 21, 2017Updated 8 years ago
- ☆10Apr 18, 2019Updated 6 years ago
- Deepwood- is an easy-to-use, Python-based RAT & Stealer, which send info to your webhook. You can recover passwords, aplication data, dis…☆14May 20, 2024Updated last year
- WD My Cloud PoC exploit☆41May 22, 2019Updated 6 years ago
- Simple network tools written with Scapy.☆23Mar 22, 2016Updated 9 years ago
- ☆36Mar 11, 2019Updated 6 years ago
- The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assemb…☆22Mar 31, 2019Updated 6 years ago
- Fixes known BinaryFormatter deserialization vulnerabilities☆12Dec 16, 2019Updated 6 years ago
- vncsnapshot☆14Mar 23, 2012Updated 13 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- SIP-Based DDoS Defense Tool☆15Sep 6, 2018Updated 7 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- Automate pwnage☆12Jul 17, 2018Updated 7 years ago
- My eJPT exam cheatSheet☆12Nov 9, 2021Updated 4 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- Taking another crack at OS dev...☆11Jun 12, 2022Updated 3 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Dendroid HTTP RAT Original☆71Dec 28, 2016Updated 9 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- ☆45Jul 12, 2018Updated 7 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- Tools and library to manipulate EFI variables.☆10Updated this week
- WebCruiserWVS 轻量级基于C#的扫描器,椰树扫描器的前身☆11Apr 18, 2018Updated 7 years ago