Vector-Rat is a powerful remote access tool designed specifically for Windows. It allows seamless control and management of any device remotely, enabling users to interact, monitor, and transfer files with ease.
☆20Apr 6, 2025Updated 11 months ago
Alternatives and similar repositories for Vector-Rat
Users that are interested in Vector-Rat are comparing it to the libraries listed below
Sorting:
- Enhanced Stealth Tunnel for Linux (Red Team Ops on compromised machine with root)☆15Jun 10, 2025Updated 9 months ago
- Python3 HTTP Server with upload functionality☆21Dec 4, 2023Updated 2 years ago
- Switch between two running operating systems without losing their state.☆58Jan 2, 2026Updated 2 months ago
- This project is an interactive and responsive dashboard designed with HTML and CSS. It features a sleek navigation bar 🔗, data cards to …☆13May 23, 2025Updated 9 months ago
- AISecLists - Your AI Red Teaming Arsenal. Discover a curated collection of prompt lists for diverse AI security assessments, including LL…☆13Jan 18, 2025Updated last year
- Rigorously evaluating autonomous systems for cybersecurity at scale☆30Jul 9, 2025Updated 8 months ago
- Automated Cloud Misconfiguration Testing☆22Jun 20, 2025Updated 9 months ago
- 🎮 Guess the Number Game: A fun and interactive game where the computer picks a random number between 1 and 100. 🤔 Your mission? Guess t…☆33Oct 20, 2025Updated 5 months ago
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆21Dec 10, 2024Updated last year
- Script for encrypting a GNU/Linux filesystem and then destroying the keys☆12Sep 23, 2018Updated 7 years ago
- Artaxerxes - Adaptive High-Performance Stress Tester v.1.0. Rebuild old version Xerxes DDoS. Supports GPU+io_uring, DPDK, eBPF/XDP with i…☆44Jul 1, 2025Updated 8 months ago
- A lightweight Python HTTP server with fuzzy filename matching and automatic fallback to directory listing.☆13Aug 28, 2025Updated 6 months ago
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆21Aug 2, 2025Updated 7 months ago
- CloudFlare Ultimate WAF Bypass Tamper Script Comprehensive evasion techniques collection Research and educational purposes only by KL3FT3…☆54Nov 6, 2025Updated 4 months ago
- Wordlists for content discovery with special words in different languages☆15Jan 17, 2025Updated last year
- Hello Hackers ! , Shigaraki tool is all in one for finding specially admin panels , login panels from all subdomains .☆15Jul 1, 2025Updated 8 months ago
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 5 years ago
- Chrome extension that allows users to generate strong and secure passwords with just one click.☆31Feb 12, 2026Updated last month
- A web penetration testing framework !☆31Jun 10, 2023Updated 2 years ago
- A Model Context Protocol (MCP) server that integrates Volatility 3 memory forensics framework with Claude☆32Jul 7, 2025Updated 8 months ago
- HashRipper is a powerful and fast multi-threaded ethical hacking tool written in Python for cracking hashes. It supports over 17+ popular…☆22Nov 19, 2025Updated 4 months ago
- A cloud platform for deploying and hosting websites with API integration, build automation, and reverse proxy setup.☆17Dec 26, 2024Updated last year
- Medical IOT System Consists of Smart Band, Medical generative QA model, mobile application which facilitate efficient healthcare monitori…☆25Mar 28, 2024Updated last year
- ☆19Apr 27, 2025Updated 10 months ago
- OWASP EKS Goat is a deliberately vulnerable EKS cluster environment to explore AWS cloud-native security through hands-on attack and defe…☆42Feb 20, 2026Updated last month
- The project involves data mining algorithms used to mine patterns and trends in the occurrence of crimes in any city, with respect to day…☆24Oct 19, 2019Updated 6 years ago
- Exercises to practice Object-Oriented Programming in C++☆28Mar 9, 2024Updated 2 years ago
- Automated way to extract juicy info with subfinder and waybackurls☆41Aug 24, 2025Updated 6 months ago
- Empowering industry issues with Blockchain Data Security, Seamless Queue Management, AI-Driven Workspaces, and .Smart SOS.☆14Jun 10, 2024Updated last year
- Publicly availalbe vulnarble by desgin vm/machines☆43Aug 10, 2022Updated 3 years ago
- Automated News Feedback System☆22Nov 8, 2024Updated last year
- a personal leaks database to improve combolists and for more effective pentests☆25Sep 4, 2023Updated 2 years ago
- Firewall Application Using Python3☆19Apr 28, 2022Updated 3 years ago
- A Development of AI to automate bug bounty☆33Mar 10, 2025Updated last year
- This simple web app helps you organize your tasks. 📝 With HTML , CSS and JAVASCRIPT, you can add ➕, view 👀, edit ✏️, and delete 🗑️ tas…☆56Dec 22, 2025Updated 2 months ago
- ☆38Nov 24, 2025Updated 3 months ago
- This is a guide for arch linux installation with Openbox Window Managers☆22Mar 8, 2023Updated 3 years ago
- Crime analysis in R☆31May 7, 2017Updated 8 years ago
- VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute…☆38May 23, 2022Updated 3 years ago