alyaparan / NjRat-0.7DView external linksLinks
About njRAT has been around since at least 2013 and is one of the most prevalent malware families. Built in .NET Framework, the malware provides attackers with remote control over the infected systems, utilizes dynamic DNS for command-and-control (C&C), and uses a custom TCP protocol over a configurable port for communication.
☆24Aug 20, 2023Updated 2 years ago
Alternatives and similar repositories for NjRat-0.7D
Users that are interested in NjRat-0.7D are comparing it to the libraries listed below
Sorting:
- Undetected Mlbb Hack☆11Sep 2, 2024Updated last year
- ☆11Feb 28, 2022Updated 3 years ago
- AES-encrypted TCP/IP swiss army knife.☆11Nov 6, 2022Updated 3 years ago
- This is a simple computer based test project using solely html, css & javascript(ES5). The project can display questions from an API or s…☆19Oct 27, 2021Updated 4 years ago
- AsyncRAT的汉化版☆11Dec 11, 2025Updated 2 months ago
- Device Tree for POCO X4 Pro 5G/Redmi Note 11E Pro/Redmi Note 11 Pro 5G/Redmi Note 11 Pro+ 5G (peux/veux)☆10Jan 28, 2026Updated 2 weeks ago
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- dorkX is a tool to do google dork in seconds and the results will be saved in results.txt☆10Oct 16, 2025Updated 3 months ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- webshell编码工具 支持 jsp net php asp编码免杀☆26Dec 16, 2025Updated 2 months ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Mar 15, 2019Updated 6 years ago
- Small snippets of code we often find useful☆11Nov 9, 2019Updated 6 years ago
- This Script will help you to gather information about your victim or friend☆14Jan 30, 2021Updated 5 years ago
- Simple python3 script to automate CVE-2018-9995☆11Feb 20, 2024Updated last year
- Follina (CVE-2022-30190) is a Microsoft Office zero-day vulnerability that has recently been discovered. It’s a high-severity vulnerabili…☆10May 14, 2023Updated 2 years ago
- Secure Flutter desktop app connecting Auth0 authentication with local Ollama AI models via encrypted tunneling. Access your private AI in…☆18Updated this week
- Here it is. Just a lofi player.☆10Jun 24, 2023Updated 2 years ago
- RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot…☆12Jul 29, 2019Updated 6 years ago
- Simple legit cheat☆12May 16, 2021Updated 4 years ago
- ☆10Jun 15, 2024Updated last year
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated last year
- 月之暗面 moonshot AI nodejs SDK typescript kimi☆12Apr 13, 2024Updated last year
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- cve-2025-24813验证脚本☆11Mar 14, 2025Updated 11 months ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- A python script that converts a python program into a low weight Android package and more.☆10Jun 4, 2023Updated 2 years ago
- LDAP Enumeration Tool☆13Mar 28, 2024Updated last year
- Linux password crack☆14Apr 11, 2022Updated 3 years ago
- A portable and efficient infrastracture for value profilers. Doc: https://vclinic.readthedocs.io/en/latest/index.html☆14Jan 22, 2026Updated 3 weeks ago
- Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner☆12Apr 25, 2018Updated 7 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- A simple Mac-Address Sniffer based on tshark☆12Dec 27, 2018Updated 7 years ago
- Moved to HappyHackingSpace/pirebok☆14Updated this week
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 6 years ago
- Parse Suricata rules☆13Aug 1, 2023Updated 2 years ago
- This is gui based on zenity and this sms bomber who send otp in target phone number unlimitly. Many times you just want to ann…☆12Nov 10, 2021Updated 4 years ago
- 👽 Exploits written for research purposes.☆11Nov 15, 2021Updated 4 years ago