boilerplate python rat
☆114Oct 1, 2020Updated 5 years ago
Alternatives and similar repositories for basicRAT
Users that are interested in basicRAT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python Remote Administration Tool (RAT)☆3,573Jan 4, 2024Updated 2 years ago
- Python based Remote Administration Tool(RAT)☆92May 25, 2020Updated 5 years ago
- Platform for a noob hacker to learn hacking on localhost.☆11Oct 14, 2016Updated 9 years ago
- Find open databases - Powered by Binaryedge.io☆14Jan 4, 2020Updated 6 years ago
- This is a plugin for the c# R.A.T server providing extension to android based phone systems☆20Mar 2, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- The MacOS ransomware project☆14Jun 24, 2017Updated 8 years ago
- Python / C# Unmanaged PowerShell based RAT☆774Mar 29, 2023Updated 3 years ago
- Windows Remote Administration Tool (RAT)☆33Feb 11, 2019Updated 7 years ago
- python remote access trojan☆39Feb 8, 2017Updated 9 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,403Feb 10, 2021Updated 5 years ago
- Shortcut Downloader☆11Jan 11, 2017Updated 9 years ago
- CVE-2018-15982_EXP_IE☆12Dec 12, 2018Updated 7 years ago
- A Scantime Crypter coded in Python 2.7☆15Aug 26, 2017Updated 8 years ago
- Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Rem…☆75Dec 7, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- IIS PUT WebDAV GetShell Exploit☆18Aug 15, 2020Updated 5 years ago
- Public Nullsecurity Website☆14Jan 2, 2026Updated 3 months ago
- ☆13Dec 22, 2017Updated 8 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- Python network worm that spreads on the local network and gives the attacker control of these machines.☆531Oct 5, 2022Updated 3 years ago
- The best game bot for mobile game vHack OS. It completely automates your game. So do not hesitate and download and play 24/7 like everyon…☆18Sep 8, 2018Updated 7 years ago
- Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor a…☆1,181Oct 20, 2022Updated 3 years ago
- LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)☆1,130Jun 24, 2019Updated 6 years ago
- A small HTTP server written in C++ using IO Completion Ports.☆24Sep 13, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 分析指定应用程序的劫持DLL☆14Sep 18, 2015Updated 10 years ago
- RAT And C&C Resources. 250+ Open Source Projects, 1200+ RAT/C&C blog/video.☆2,190Feb 17, 2020Updated 6 years ago
- Androsploit is a java application an upgrade to Android-H with material design GUI (Still Developing)☆13Oct 4, 2020Updated 5 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- A python reverse shell that uses DNS as the c2 channel☆507Oct 10, 2015Updated 10 years ago
- Simple Email/MMS spoofer included mass mail attack feature and a compatible mobile version☆23May 17, 2018Updated 7 years ago
- Hack any account sending fake nitro QR code (only for educational purpose)☆19Jan 7, 2022Updated 4 years ago
- Lilith - Foundational reverse engineering resource for cybersecurity entrepreneurs in C++☆742Apr 1, 2020Updated 6 years ago
- Turn your Raspberry Pi Pico into a hacking device☆13Mar 7, 2024Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Nov 18, 2018Updated 7 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- Simple tool to extract icons from a pe file and other useful information☆13Jun 22, 2018Updated 7 years ago
- UIAccess UAC Bypass using token duplication and keyboard events☆27Sep 26, 2019Updated 6 years ago
- Web application that lets you test if your domain is vulnerable to email spoofing☆42Mar 5, 2019Updated 7 years ago
- This is a malware repo. Use them at your own risk. This is strictly for educational purposes only.☆12May 22, 2019Updated 6 years ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆10Jul 29, 2019Updated 6 years ago