Tomiwa-Ot / telegram-c2
Control a system remotely via telegram
☆36Updated 5 months ago
Alternatives and similar repositories for telegram-c2:
Users that are interested in telegram-c2 are comparing it to the libraries listed below
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Teardroid v4 Botnet API☆64Updated last year
- This is power full BotNet☆40Updated last year
- A simple script to obfuscate batch(bat) code easily☆23Updated last year
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Updated last year
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆72Updated this week
- List of RAT's For android. To get any support on them contact t.me/efxtv☆46Updated 4 months ago
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆10Updated last month
- A Simple Script For SSH BruteForce☆36Updated last year
- Clipboard poisoning attack.☆56Updated 4 years ago
- A tool for automatically change the Tor IP address over time.☆79Updated 2 weeks ago
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆72Updated last year
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated last year
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- AirHunt is a versatile and user-friendly wireless network hacking toolkit designed for security professionals and enthusiasts. With a wid…☆43Updated last year
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆14Updated last year
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆24Updated 2 years ago
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆35Updated 6 months ago
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆13Updated last year
- An Android RAT that written in C# by me☆53Updated 4 years ago
- Very good and stable Android RATs. They are easy to use and they are very stable☆40Updated 3 weeks ago
- An Android app which attempts to prevent you from using your device without becoming the administrator.☆64Updated 2 years ago
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆16Updated 2 years ago
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)☆32Updated 2 years ago
- DrShell is a cutting-edge tool designed for the dynamic management of reverse shell sessions. Whether you are a seasoned security profess…☆10Updated 2 months ago
- WH RAT V2 2022☆22Updated last year
- A very user friendly and advanced phishing toolkit made for hackers☆29Updated 3 years ago
- It is all in One Pentesting tool . It Has modules , Information Gathering exploitation + vulnerability scanning , proxy scraper and wo…☆20Updated 3 weeks ago
- AndroMW - control your android device without internet☆30Updated last year
- ☆18Updated 3 months ago