Information This tool is for educational purpose only, usage of TheFatRat for attacking targets without prior mutual consent is illegal. Developers assume no liability and are not responsible for any misuse or damage cause by this program. Features ! Fully Automating MSFvenom & Metasploit. Local or remote listener Generation. Easily Make Backdo…
☆16Jan 8, 2021Updated 5 years ago
Alternatives and similar repositories for TheFatRat
Users that are interested in TheFatRat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Im a free fire max I'd hacker I'm hack all tipes of IDs fb and google☆34May 8, 2023Updated 2 years ago
- simple script to pwn android phone with physical access☆26Dec 22, 2018Updated 7 years ago
- # clone the repo $ git clone https://github.com/sherlock-project/sherlock.git # change the working directory to sherlock $ cd sherlock …☆13Jan 8, 2021Updated 5 years ago
- User Recon Find usernames across over 75 social networks This is useful if you are running an investigation to determine the usage of the…☆15Feb 8, 2021Updated 5 years ago
- Black-Dragon Tools Installer For Pentesting And Hack Account,Work On Terminal How To Install it Tested On Termux(Android 6.0) $ pkg upda…☆15Feb 1, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Simple HTTP tunnel using SSH remote port forwarding☆26May 8, 2021Updated 4 years ago
- The Choice TheChoice is a collection of 14 hacker tools from @thelinuxchoice Installation : $ apt update && apt upgrade $ apt install git…☆17Dec 31, 2020Updated 5 years ago
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆10Jan 20, 2017Updated 9 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Awesome hacking is an awesome collection of hacking tools.☆14Apr 24, 2019Updated 6 years ago
- icloud bypass developed by s1a73r5☆11Dec 30, 2019Updated 6 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- Python automated wifi jammer☆40Mar 24, 2016Updated 10 years ago
- A guide to hosting a website from your home using an Orange Pi Zero 2W, Ubuntu, and Apache☆15Jun 14, 2024Updated last year
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- ☆11Nov 14, 2022Updated 3 years ago
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A Discord Self-Bot to cheat at trivia☆10Jul 15, 2024Updated last year
- Termux Maskphish : Mask URL in Termux It takes time to install the Phishing Tool and then After doing the tedious setup when we send the…☆20Feb 1, 2021Updated 5 years ago
- Hack any account sending fake nitro QR code (only for educational purpose)☆18Jan 7, 2022Updated 4 years ago
- Hack anyone snapchat Account by Phone and gmail☆11Oct 18, 2022Updated 3 years ago
- Discord RAT made in powershell (open source)☆12Jul 16, 2025Updated 8 months ago
- ☆14Sep 16, 2022Updated 3 years ago
- ☆27Jul 27, 2024Updated last year
- Google hacking☆11Apr 26, 2023Updated 2 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A python application that can serve up a little website on the ESP8266 running as a WiFi access point. It can scan for other visible acce…☆13Jul 12, 2017Updated 8 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆15May 17, 2020Updated 5 years ago
- Stealer chrome v81+, Firefox v75+, And more than 30 different programs and crypto-wallets☆11May 1, 2020Updated 5 years ago
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆14Sep 23, 2022Updated 3 years ago
- Arduino library for the Adafruit FONA☆16Jul 14, 2015Updated 10 years ago
- hacking tools☆12Feb 9, 2019Updated 7 years ago
- Magisk module to disable WiFi 5Ghz Band on your Qualcomm device☆14Oct 29, 2021Updated 4 years ago