akhomlyuk / pyradm
🔮 Python Remote administration tool via telegram
☆46Updated 10 months ago
Alternatives and similar repositories for pyradm:
Users that are interested in pyradm are comparing it to the libraries listed below
- LNK-Dropper Builder☆18Updated 4 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆34Updated last year
- Here are +200 different rats some with source code☆85Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆62Updated 2 years ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆47Updated last year
- This is a exploit with the capability to control ip camera movement even without a username and password.☆54Updated 5 months ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- i will upload all the books that helped me in learning in this repo☆20Updated 2 years ago
- Social Engineering Browser Update Attack.☆56Updated last year
- PassBreaker☆55Updated 9 months ago
- Boost website hits by generating requests from multiple proxy IPs.☆53Updated 11 months ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated last year
- Python-based web scraper for a darkweb marketplace on the Tor network.☆25Updated 4 months ago
- An open-source .NET Ransomware☆24Updated 3 years ago
- Clipboard poisoning attack.☆55Updated 4 years ago
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆36Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆11Updated 8 months ago
- The africana-framework is a software designed for network & web hacking by automating as much stuff as possible to detect vulnerabilities…☆27Updated 2 months ago
- Mass bruteforce authentication of network protocols☆45Updated last year
- ☆21Updated last year
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆58Updated 3 years ago
- Hacking with PasteJacking technique☆20Updated 6 months ago
- Ded Security Framework is a tool aimed at security professionals☆34Updated 8 months ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆102Updated last year
- Kali Packerge Manager☆56Updated last year
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆15Updated last year
- Dogma V1.5.3☆30Updated 4 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆122Updated 2 years ago