Vector-Rat is a powerful remote access tool designed specifically for Windows. It allows seamless control and management of any device remotely, enabling users to interact, monitor, and transfer files with ease.
☆20Apr 6, 2025Updated last year
Alternatives and similar repositories for Vector-Rat
Users that are interested in Vector-Rat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AISecLists - Your AI Red Teaming Arsenal. Discover a curated collection of prompt lists for diverse AI security assessments, including LL…☆15Jan 18, 2025Updated last year
- Rigorously evaluating autonomous systems for cybersecurity at scale☆31Jul 9, 2025Updated 10 months ago
- Switch between two running operating systems without losing their state.☆59Jan 2, 2026Updated 4 months ago
- Automated Cloud Misconfiguration Testing☆25Jun 20, 2025Updated 11 months ago
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆27May 4, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A lightweight Python HTTP server with fuzzy filename matching and automatic fallback to directory listing.☆13Aug 28, 2025Updated 8 months ago
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆24Aug 2, 2025Updated 9 months ago
- The repo contains publicly available malware analysis and reversing resources.☆15Oct 13, 2025Updated 7 months ago
- Hello Hackers ! , Shigaraki tool is all in one for finding specially admin panels , login panels from all subdomains .☆15Jul 1, 2025Updated 10 months ago
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 6 years ago
- A web penetration testing framework !☆35Jun 10, 2023Updated 2 years ago
- An application for analysing crime and predicting them in a particular area by the use of data visualization☆13Nov 6, 2022Updated 3 years ago
- A Model Context Protocol (MCP) server that integrates Volatility 3 memory forensics framework with Claude☆38Jul 7, 2025Updated 10 months ago
- This repository contains five projects that were part of CS5700 curriculum.☆17Sep 22, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆19Apr 27, 2025Updated last year
- OWASP EKS Goat is a deliberately vulnerable EKS cluster environment to explore AWS cloud-native security through hands-on attack and defe…☆43Apr 5, 2026Updated last month
- AI-Powered Agents for Bub-Bounty Pentesting and Red-Teaming purposes☆260Apr 30, 2026Updated 2 weeks ago
- The project involves data mining algorithms used to mine patterns and trends in the occurrence of crimes in any city, with respect to day…☆24Oct 19, 2019Updated 6 years ago
- 🚀 A modern, responsive portfolio template for cybersecurity professionals built with React, TypeScript, and Flowbite. Features include s…☆42Feb 3, 2026Updated 3 months ago
- Exercises to practice Object-Oriented Programming in C++☆29Mar 9, 2024Updated 2 years ago
- CTF writeups maintained by TeamShakti members.☆28Apr 5, 2024Updated 2 years ago
- Automated way to extract juicy info with subfinder and waybackurls☆41Aug 24, 2025Updated 8 months ago
- Empowering industry issues with Blockchain Data Security, Seamless Queue Management, AI-Driven Workspaces, and .Smart SOS.☆14Jun 10, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- a personal leaks database to improve combolists and for more effective pentests☆25Sep 4, 2023Updated 2 years ago
- Automated News Feedback System☆21Nov 8, 2024Updated last year
- Firewall Application Using Python3☆19Apr 28, 2022Updated 4 years ago
- A Development of AI to automate bug bounty☆38Mar 10, 2025Updated last year
- ☆40May 1, 2026Updated 2 weeks ago
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆34Updated this week
- xPrivo is the privacy-first AI assistant that you can self-host. No accounts, never. Free as in freedom.☆113May 6, 2026Updated 2 weeks ago
- ☆73Mar 8, 2026Updated 2 months ago
- Get information about Indian Mutual Funds from their ISIN numbers.☆46May 6, 2026Updated 2 weeks ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Appollo is an open-source tool for continuous attack surface monitoring, helping organizations identify, analyze, and mitigate security r…☆43Feb 11, 2026Updated 3 months ago
- This handbook is a curated compilation of Low-Level Design (LLD) principles, object-oriented design patterns, and system modeling techniq…☆63Jan 25, 2026Updated 3 months ago
- Agent-driven Chrome extension for full browser control via CLI☆238May 13, 2026Updated last week
- Python library to download bulk of images from Bing☆41Mar 23, 2026Updated last month
- Midnight Sea: navigating in the waters of dark web markets☆74Mar 21, 2025Updated last year
- Free bash script script to bypass activation lock device running ios12-14.8☆36May 26, 2024Updated last year
- Association Rule Mining from Spatial Data for Crime Analysis☆41Feb 7, 2019Updated 7 years ago