๐ฎ Python Remote administration tool via telegram
โ56Apr 21, 2025Updated 10 months ago
Alternatives and similar repositories for pyradm
Users that are interested in pyradm are comparing it to the libraries listed below
Sorting:
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requestsโ17Jun 22, 2024Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.โ29Apr 3, 2025Updated 11 months ago
- โ34Feb 27, 2026Updated last week
- โ13Mar 1, 2024Updated 2 years ago
- A simple trojan made for Windows in Python.โ11Feb 8, 2025Updated last year
- keep watching new bug bounty (vulnerability) postings.โ13Apr 7, 2024Updated last year
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and Cโฆโ17Feb 20, 2026Updated 2 weeks ago
- Yet Another Mac Changer!!!โ12Jan 26, 2023Updated 3 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interfaceโ30Mar 24, 2023Updated 2 years ago
- A script to automate keystrokes through a graphical desktop program.โ34Jun 10, 2025Updated 8 months ago
- Advanced Network Interface Management and Monitoringโ33Jan 6, 2024Updated 2 years ago
- SpeedyTestโ17Jun 21, 2023Updated 2 years ago
- plugx rat c2, supports TCP, UDP, HTTPโ14Sep 25, 2024Updated last year
- Oh My Pentest Report is a customizable Oh My Zsh theme designed for pentesters.โ21Feb 17, 2026Updated 2 weeks ago
- AWS Cloud Landscape Search Engineโ20Nov 29, 2023Updated 2 years ago
- Service that scans your Infrastructure as Code for common vulnerabilitiesโ49Dec 14, 2023Updated 2 years ago
- AntiHunter Perimeter Defense Systemsโ105Updated this week
- Melee: Tool to Detect Infections in MySQL Instancesโ22Aug 6, 2023Updated 2 years ago
- โ44Updated this week
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)โ113Sep 17, 2025Updated 5 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.โ51Feb 22, 2024Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).โ59Apr 16, 2024Updated last year
- Mass bruteforce authentication of common services with common credentials.โ54Dec 2, 2023Updated 2 years ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document beforโฆโ20Sep 27, 2024Updated last year
- โ21Dec 16, 2024Updated last year
- A fast subdomain takeover toolโ85Nov 10, 2023Updated 2 years ago
- Effortlessly browse and manage your files with ease using Tiny File Manager [WH1Z-Edition], a compact single-file PHP file manager.โ25Feb 13, 2024Updated 2 years ago
- Opens a reverse PowerShell terminal to the client. Shell receives commands through TCPโ24Apr 18, 2015Updated 10 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hashโ51Oct 12, 2024Updated last year
- โ56Jan 22, 2025Updated last year
- It was developed to speed up the processes of SOC Analysts during analysisโ46Mar 15, 2024Updated last year
- ๐๏ธ Modded Program for remote control of windows computers via telegram bot. Written in C#โ106Mar 1, 2026Updated last week
- Remote packet Sniffer that encapsulates captured packets into TZSP and copies them to a remote IPโ21Nov 19, 2025Updated 3 months ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.โ33Mar 4, 2024Updated 2 years ago
- โ28Apr 4, 2023Updated 2 years ago
- โ27Aug 18, 2023Updated 2 years ago
- Memory Scanerโ65Sep 9, 2022Updated 3 years ago
- Cross Platform Telegram based RAT that communicates via telegram to evade network restrictionsโ426Sep 17, 2025Updated 5 months ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their suโฆโ35Feb 20, 2024Updated 2 years ago