☆59Jan 14, 2018Updated 8 years ago
Alternatives and similar repositories for JSRAT
Users that are interested in JSRAT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repo for hugo generated files☆13Apr 7, 2026Updated 3 weeks ago
- Virus RAT v8.0 Beta☆29Mar 4, 2017Updated 9 years ago
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆16Mar 12, 2017Updated 9 years ago
- KrackPlus seeks to handle dependencies and parse the output from two scripts made by Mathy Vanhoef; with KrackPlus users can scan their d…☆13Dec 8, 2018Updated 7 years ago
- How to install and use JupyterHub on Kubernetes. Workshop with Slurm and Intel☆12Nov 23, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- SideEffect Keylogger☆14Dec 30, 2016Updated 9 years ago
- 1C:Enterprise 8 - Event log loader☆16Oct 6, 2017Updated 8 years ago
- Free cybersecurity training resources☆13Feb 5, 2020Updated 6 years ago
- ZeroRemote Trojan SRC Extract☆20Mar 1, 2017Updated 9 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Apr 17, 2022Updated 4 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆39Apr 25, 2013Updated 13 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆300May 5, 2016Updated 10 years ago
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Oct 8, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Quick and dirty .net console app for querying mssql servers.☆24Aug 30, 2018Updated 7 years ago
- Extract files using QR Codes☆10Feb 10, 2018Updated 8 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Oct 30, 2017Updated 8 years ago
- Набор инструментов, которые позволяют расширить работу с интерфейсом платформы 1С☆23Nov 12, 2019Updated 6 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆24Jun 22, 2018Updated 7 years ago
- Simple Remote Access Trojan☆27Dec 28, 2016Updated 9 years ago
- ☆16May 6, 2015Updated 11 years ago
- Arp Spoof and inject beef hook in seconds☆13Feb 2, 2014Updated 12 years ago
- ☆20Apr 21, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The Mattermost AI Framework☆29May 29, 2024Updated last year
- minepeon-base☆24Jul 2, 2014Updated 11 years ago
- Python 3 script for interacting with Shodan API☆20Nov 4, 2024Updated last year
- initial push☆14Feb 10, 2015Updated 11 years ago
- Splunk app for visualization of DMARC RUA mails☆15Sep 26, 2025Updated 7 months ago
- Advanced web server fingerprinting☆22Sep 27, 2017Updated 8 years ago
- Automated Google dorking with custom search engines☆26May 2, 2020Updated 6 years ago
- ☆14May 14, 2018Updated 7 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Virtual scenario for Network Penetration Testing☆14Mar 19, 2017Updated 9 years ago
- CherryTree OSCP methodology template☆15Dec 10, 2018Updated 7 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Jun 6, 2023Updated 2 years ago
- Open source image editor for windows 10. Can be controlled by voice commands and Cortana.☆17Nov 14, 2017Updated 8 years ago
- My secret sauce: A UWP Application development framework. Batteries required!☆14Aug 17, 2019Updated 6 years ago
- Network Scanner for OpenSSL Memory Leak (CVE-2014-0160)☆11Sep 24, 2015Updated 10 years ago
- Creates the initial scope of files and directories/folders of a web site for Spiders/Robots/Crawlers☆16Sep 8, 2013Updated 12 years ago