"Ghost (RAT)" -> Reverse shell and management console for Windows
☆19May 23, 2022Updated 3 years ago
Alternatives and similar repositories for Ghost
Users that are interested in Ghost are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.☆15Apr 17, 2021Updated 5 years ago
- Recon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnais…☆16May 28, 2022Updated 3 years ago
- Open-source Discord RAT (Remote Access Trojan) controlled directly from your own server.☆13Nov 24, 2024Updated last year
- Simple python script for brute force attack to smtp users☆13Mar 31, 2026Updated last month
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Jan 31, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- MacOSX Privilege Escalation Research☆31Sep 9, 2021Updated 4 years ago
- ☆15Jul 10, 2025Updated 9 months ago
- Mrco24-Lfi-Scanner is a high-speed Local File Inclusion (LFI) vulnerability scanning tool developed in the Go programming language. It's …☆13Dec 16, 2023Updated 2 years ago
- SHELLCTF 2021 WriteUps. A beginner-friendly CTF with an objective to get the enthusiastic students familiar with the basics, along with a…☆12Jun 7, 2021Updated 4 years ago
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆428Jun 17, 2022Updated 3 years ago
- Tools that trigger False Positive AV alerts☆56Dec 24, 2024Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆16Aug 16, 2022Updated 3 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Apr 17, 2022Updated 4 years ago
- Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.☆67Nov 14, 2025Updated 5 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- random scripts☆17Nov 10, 2024Updated last year
- Got a long list of email recipients? Let's get that sorted. Just feed your connection details, and your subject list in a CSV format, the…☆14Jul 5, 2019Updated 6 years ago
- A Python script to find tenant id an region from a list of domain names.☆21Jan 31, 2025Updated last year
- ☆82Apr 13, 2026Updated 3 weeks ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Nov 21, 2022Updated 3 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 3 years ago
- A powerful reverse shell generator☆47Mar 18, 2026Updated last month
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Aug 13, 2023Updated 2 years ago
- Currently Does not work DUE to Pimeyes API change. A GUI edition of this tool; is used to search a persons face based on the API on pimey…☆11Dec 4, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆15Mar 3, 2021Updated 5 years ago
- i3 rice Inspired by Cyberpunk 2077☆38Oct 6, 2021Updated 4 years ago
- A curated list of amazingly awesome OSINT☆27Sep 16, 2024Updated last year
- Google Meet Phishing Template For Gophish☆49Aug 3, 2022Updated 3 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Nov 17, 2022Updated 3 years ago
- ☆17Jun 13, 2022Updated 3 years ago
- 🚀An illustration of blockchain/Crypto technology😃 by: Building our own very simple Cryptocurrency (like Bitcoin)/ smart contracts/ Hot …☆10May 10, 2023Updated 2 years ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆48May 28, 2022Updated 3 years ago
- A TCP relay/reverse proxy with Node.js☆47Mar 20, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Exfiltrate all saved Wi-Fi passwords from a Windows PC☆13Sep 14, 2023Updated 2 years ago
- Set up Flipper Zero desktop environment.☆17Sep 9, 2025Updated 8 months ago
- This project is of Hotel Management System, which allows you to book rooms, seeing prices of rooms, see reviews. It would also show types…☆11Dec 13, 2021Updated 4 years ago
- A web application attack surface mapping tool. It takes in a list of urls then performs numerous probes☆15Aug 4, 2022Updated 3 years ago
- Optimized WordLists for Pentesting☆16Feb 6, 2020Updated 6 years ago
- Simple keylogger written in C# which is ready for modifications.☆14Jul 29, 2021Updated 4 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆19Aug 4, 2023Updated 2 years ago