"Ghost (RAT)" -> Reverse shell and management console for Windows
☆19May 23, 2022Updated 3 years ago
Alternatives and similar repositories for Ghost
Users that are interested in Ghost are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.☆15Apr 17, 2021Updated 4 years ago
- Recon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnais…☆13May 28, 2022Updated 3 years ago
- Open-source Discord RAT (Remote Access Trojan) controlled directly from your own server.☆13Nov 24, 2024Updated last year
- Simple python script for brute force attack to smtp users☆12Mar 15, 2024Updated 2 years ago
- MacOSX Privilege Escalation Research☆31Sep 9, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆15Jul 10, 2025Updated 8 months ago
- SHELLCTF 2021 WriteUps. A beginner-friendly CTF with an objective to get the enthusiastic students familiar with the basics, along with a…☆12Jun 7, 2021Updated 4 years ago
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆423Jun 17, 2022Updated 3 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Aug 16, 2022Updated 3 years ago
- 🔐 HIROO is an FUD Remote Administration Tool (RAT) Generator☆16Aug 14, 2019Updated 6 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Apr 17, 2022Updated 3 years ago
- random scripts☆17Nov 10, 2024Updated last year
- Short Python script that attempts to neuter USB Rubber Duckies.☆13Jun 25, 2019Updated 6 years ago
- A Python script to find tenant id an region from a list of domain names.☆18Jan 31, 2025Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Run shellcode through InnoSetup code engine.☆74Jun 22, 2023Updated 2 years ago
- Got a long list of email recipients? Let's get that sorted. Just feed your connection details, and your subject list in a CSV format, the…☆14Jul 5, 2019Updated 6 years ago
- Driver Attack Platform for Linux☆18Mar 2, 2023Updated 3 years ago
- ☆81Jan 30, 2026Updated last month
- Decentralised exchange script - open source☆12Apr 17, 2019Updated 6 years ago
- Facebook phishing page☆10Oct 4, 2020Updated 5 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 3 years ago
- A powerful reverse shell generator☆46Mar 18, 2026Updated last week
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Aug 13, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆15Mar 3, 2021Updated 5 years ago
- Shellcode process injector☆28May 22, 2020Updated 5 years ago
- A tool for stealing the telegram account or managing the telegram account?☆18Jun 9, 2025Updated 9 months ago
- i3 rice Inspired by Cyberpunk 2077☆38Oct 6, 2021Updated 4 years ago
- Save and download all favorite images from website in an easy way.☆11Jul 26, 2017Updated 8 years ago
- Google Meet Phishing Template For Gophish☆48Aug 3, 2022Updated 3 years ago
- It's always time taking and irritating if you need to import a long sample data from an Excel file to your MYSQL Database. This Project c…☆12Jun 4, 2018Updated 7 years ago
- Just some flipper zero scripts☆14Sep 3, 2022Updated 3 years ago
- Burp Suite HTTP proxy history viewer☆18Jan 22, 2017Updated 9 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆16Jun 13, 2022Updated 3 years ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆48May 28, 2022Updated 3 years ago
- A TCP relay/reverse proxy with Node.js☆47Mar 20, 2026Updated last week
- Exfiltrate all saved Wi-Fi passwords from a Windows PC☆13Sep 14, 2023Updated 2 years ago
- Non-Custoridial Secure Trustfree Bitcoin Marketplace with Escrow using Multipart Keys☆17May 31, 2023Updated 2 years ago
- This project is of Hotel Management System, which allows you to book rooms, seeing prices of rooms, see reviews. It would also show types…☆11Dec 13, 2021Updated 4 years ago
- A web application attack surface mapping tool. It takes in a list of urls then performs numerous probes☆15Aug 4, 2022Updated 3 years ago