YSCHGroup / SkyRATLinks
SkyRAT - Powershell Remote Administration Tool
☆32Updated 7 years ago
Alternatives and similar repositories for SkyRAT
Users that are interested in SkyRAT are comparing it to the libraries listed below
Sorting:
- Windows/Linux - ReverseShellBackdoor Framework☆49Updated 6 years ago
- HTTP BOTNET☆8Updated 2 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 7 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- Plog - A simple and powerful keylogger !☆11Updated 7 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 7 months ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 4 years ago
- Virus RAT v8.0 Beta☆24Updated 8 years ago
- Random stuff☆16Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- pentest toolbox☆28Updated 2 years ago
- Opens a reverse PowerShell terminal to the client. Shell receives commands through TCP☆24Updated 10 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆13Updated 8 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- A simple Android Remote Administration Tool written for https://0x00sec.org!☆36Updated 8 years ago
- Download payload to disk and install it to startup then melt.☆37Updated 6 years ago
- ZeroRemote Trojan SRC Extract☆19Updated 8 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆32Updated 8 years ago
- C# Admin Control Panel Finder For Windows☆44Updated 5 years ago
- iSpy Keylogger☆43Updated 8 years ago
- Monitor Files and Folders for Changes in Real Time .☆10Updated 6 years ago
- A TCP-Client connected Keylogger in C#☆12Updated 8 years ago
- Abuses Powershell Profiles☆13Updated 9 years ago
- Disabling Windows Defender & downloading payload☆20Updated 4 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Updated 8 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- A Linux RAT in C☆34Updated 6 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- A botnet (C&C) framework that create in bash and using crontab for periodic execute☆11Updated 7 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 8 years ago