akhomlyuk / pyradm
🔮 Python Remote administration tool via telegram
☆47Updated last year
Alternatives and similar repositories for pyradm:
Users that are interested in pyradm are comparing it to the libraries listed below
- This is a exploit with the capability to control ip camera movement even without a username and password.☆57Updated 7 months ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- i will upload all the books that helped me in learning in this repo☆20Updated 2 years ago
- The africana-framework is a software designed for network & web hacking by automating as much stuff as possible to detect vulnerabilities…☆32Updated this week
- LNK-Dropper Builder☆21Updated 6 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- Clipboard poisoning attack.☆56Updated 4 years ago
- Hacking with PasteJacking technique☆21Updated 9 months ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆22Updated 3 months ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆17Updated last year
- Nmap & SQL injection automation tool☆32Updated 5 months ago
- steal chrome saved passwords "undetectable"☆49Updated 3 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Updated last year
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆43Updated 8 months ago
- A Simple Script For SSH BruteForce☆36Updated last year
- xdebug 2.5.5 RCE exploit☆30Updated 2 months ago
- Herramienta enfocada a Blindar/Proteger nuestro equipo para que todo rastro que deje en Internet o en Redes Locales sea Falso e Inrasteab…☆27Updated last year
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆78Updated 8 months ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆14Updated last year
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆31Updated 11 months ago
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 4 years ago
- Dogma V1.5.3☆28Updated 5 years ago
- PassBreaker☆58Updated 11 months ago
- A tool for automatically change the Tor IP address over time. Maximize anonymity!☆72Updated last week
- This repository contains a few leaked files of HookBot.☆104Updated last year
- Rubber Ducky powered by NeoKey☆22Updated 9 months ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆48Updated last year
- ☆10Updated 4 months ago