Vector-Rat is a powerful remote access tool designed specifically for Windows. It allows seamless control and management of any device remotely, enabling users to interact, monitor, and transfer files with ease.
☆20Apr 6, 2025Updated last year
Alternatives and similar repositories for Vector-Rat
Users that are interested in Vector-Rat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Switch between two running operating systems without losing their state.☆58Jan 2, 2026Updated 3 months ago
- AISecLists - Your AI Red Teaming Arsenal. Discover a curated collection of prompt lists for diverse AI security assessments, including LL…☆14Jan 18, 2025Updated last year
- Automated Cloud Misconfiguration Testing☆25Jun 20, 2025Updated 9 months ago
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆21Dec 10, 2024Updated last year
- ☆14Feb 25, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A lightweight Python HTTP server with fuzzy filename matching and automatic fallback to directory listing.☆13Aug 28, 2025Updated 7 months ago
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆21Aug 2, 2025Updated 8 months ago
- Wordlists for content discovery with special words in different languages☆15Jan 17, 2025Updated last year
- Hello Hackers ! , Shigaraki tool is all in one for finding specially admin panels , login panels from all subdomains .☆15Jul 1, 2025Updated 9 months ago
- NoC simulation using gem5 (a simple tul)☆14Mar 23, 2024Updated 2 years ago
- A Model Context Protocol (MCP) server that integrates Volatility 3 memory forensics framework with Claude☆36Jul 7, 2025Updated 9 months ago
- HashRipper is a powerful and fast multi-threaded ethical hacking tool written in Python for cracking hashes. It supports over 17+ popular…☆22Nov 19, 2025Updated 4 months ago
- A cloud platform for deploying and hosting websites with API integration, build automation, and reverse proxy setup.☆17Dec 26, 2024Updated last year
- Medical IOT System Consists of Smart Band, Medical generative QA model, mobile application which facilitate efficient healthcare monitori…☆25Mar 28, 2024Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆19Apr 27, 2025Updated 11 months ago
- OWASP EKS Goat is a deliberately vulnerable EKS cluster environment to explore AWS cloud-native security through hands-on attack and defe…☆43Feb 20, 2026Updated last month
- A powerful subdomain enumeration tool that aggregates data from multiple sources to create comprehensive lists of root subdomains.☆47Dec 19, 2025Updated 3 months ago
- 🚀 A modern, responsive portfolio template for cybersecurity professionals built with React, TypeScript, and Flowbite. Features include s…☆39Feb 3, 2026Updated 2 months ago
- Exercises to practice Object-Oriented Programming in C++☆28Mar 9, 2024Updated 2 years ago
- Automated way to extract juicy info with subfinder and waybackurls☆41Aug 24, 2025Updated 7 months ago
- Empowering industry issues with Blockchain Data Security, Seamless Queue Management, AI-Driven Workspaces, and .Smart SOS.☆14Jun 10, 2024Updated last year
- Automated News Feedback System☆22Nov 8, 2024Updated last year
- a personal leaks database to improve combolists and for more effective pentests☆25Sep 4, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Firewall Application Using Python3☆19Apr 28, 2022Updated 3 years ago
- A Development of AI to automate bug bounty☆33Mar 10, 2025Updated last year
- This is a guide for arch linux installation with Openbox Window Managers☆22Mar 8, 2023Updated 3 years ago
- Crime analysis in R☆31May 7, 2017Updated 8 years ago
- VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute…☆38May 23, 2022Updated 3 years ago
- This repository will contain the resources for placement preparation.☆28Jul 10, 2024Updated last year
- ☆40Nov 24, 2025Updated 4 months ago
- A GUI tool for UPI payment address discovery and reconnaissance.☆23May 19, 2022Updated 3 years ago
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆34Mar 8, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This repo contains data, source code and other ressources related to the HIP model for online popularity of YouTube videos.☆42Jan 5, 2018Updated 8 years ago
- Get information about Indian Mutual Funds from their ISIN numbers.☆44Mar 27, 2026Updated 2 weeks ago
- Appollo is an open-source tool for continuous attack surface monitoring, helping organizations identify, analyze, and mitigate security r…☆43Feb 11, 2026Updated last month
- Midnight Sea: navigating in the waters of dark web markets☆71Mar 21, 2025Updated last year
- Black-Tool v5.0.0 ⬛☆78Apr 4, 2024Updated 2 years ago
- Free bash script script to bypass activation lock device running ios12-14.8☆35May 26, 2024Updated last year
- ☆35May 1, 2024Updated last year