"Ghost (RAT)" -> Reverse shell and management console for Windows
☆18May 23, 2022Updated 3 years ago
Alternatives and similar repositories for Ghost
Users that are interested in Ghost are comparing it to the libraries listed below
Sorting:
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Jan 31, 2025Updated last year
- ☆14Jul 10, 2025Updated 7 months ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Apr 17, 2022Updated 3 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Nov 21, 2022Updated 3 years ago
- Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.☆15Apr 17, 2021Updated 4 years ago
- Simple keylogger written in C# which is ready for modifications.☆14Jul 29, 2021Updated 4 years ago
- A Python script to find tenant id an region from a list of domain names.☆16Jan 31, 2025Updated last year
- A web application attack surface mapping tool. It takes in a list of urls then performs numerous probes☆15Aug 4, 2022Updated 3 years ago
- A powerful reverse shell generator☆46Apr 15, 2022Updated 3 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Aug 4, 2023Updated 2 years ago
- This is a windows maching login page designed using HTML, CSS and JS. This can be used for red teaming or cybersecurity awareness related…☆18Mar 25, 2022Updated 3 years ago
- This is a framework used to weaponize any USB Drive☆46Sep 29, 2022Updated 3 years ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆48May 28, 2022Updated 3 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆144Jun 20, 2022Updated 3 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- Multithreaded spraying of a password on all accounts of a domain.☆26Feb 11, 2025Updated last year
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆23May 8, 2022Updated 3 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- MacOSX Privilege Escalation Research☆30Sep 9, 2021Updated 4 years ago
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆34Feb 10, 2021Updated 5 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) Remote Adminstration Tools.☆24Jan 1, 2021Updated 5 years ago
- Event Masker is a Splunk streaming command to mask event from search based on a list of rules that contain conditions.☆16Oct 11, 2022Updated 3 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Jul 27, 2018Updated 7 years ago
- Front page README of my GitHub profile☆34Updated this week
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆29Sep 18, 2024Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- This is a Bad USB script which will download and execute any file from the web which is accessible from a direct download link and it wil…☆34Mar 20, 2021Updated 4 years ago
- a collection of profiles for macOS designed for penetration testing or red teaming☆38Apr 15, 2019Updated 6 years ago
- Troyano espía, Keylogger para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. Envía los datos mediante G…☆13May 9, 2020Updated 5 years ago
- A modular PowerShell-based application packaging framework for standardized, parameter-driven and deployment-system-independent software …☆12Oct 29, 2025Updated 4 months ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Nov 14, 2016Updated 9 years ago
- Proof of Concept Code for CVE-2023-32353: Local privilege escalation via iTunes in Windows☆34Jun 9, 2023Updated 2 years ago
- ☆11Oct 14, 2020Updated 5 years ago
- The telegram bot provides basic subscription for premium (non telegram premium, only bot's own). Uses some telegram payment methods☆10Mar 30, 2023Updated 2 years ago
- i3 rice Inspired by Cyberpunk 2077☆38Oct 6, 2021Updated 4 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Sep 21, 2023Updated 2 years ago
- Most Popular Attack and Defend Competitive A/D mode for 5 years!☆12Feb 5, 2018Updated 8 years ago