beescuit / njrat-attack
This is a set of scripts and exploits for attacking njrat servers.
☆10Updated 2 years ago
Alternatives and similar repositories for njrat-attack:
Users that are interested in njrat-attack are comparing it to the libraries listed below
- Tool to start a python http server in a simple way☆10Updated 2 years ago
- Create subdomains and files wordlists from your browser history☆12Updated 2 years ago
- [abandoned] 🦑 Squid is NodeJS CLI tool to scan websites trying to find vulnerabilities.☆25Updated 4 years ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆81Updated 3 years ago
- Recon(Amass, Naabu, Nuclei) workflow with Github Actions☆16Updated 3 months ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- ☆7Updated last year
- ☆12Updated 5 years ago
- pugrecon is a bash script for automatic recon of common vulnerabilities, misconfigurations and files on domains.☆23Updated 3 years ago
- A semi-automatic osint/recon framework.☆24Updated 9 months ago
- Check arbitrary file download vulnerability in the WordPress☆21Updated 5 years ago
- Tool to brute website sub-domains and dirs.☆47Updated 4 years ago
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆13Updated 2 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 9 months ago
- Some Generic Browser Exploits (For Educational Purposes Only)☆30Updated 3 years ago
- Pipe nmap verbose output to a usable format for httpx or host:port notation.☆16Updated 2 years ago
- Windows Reverse TCP backdoor☆29Updated 5 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 3 years ago
- ☆17Updated last year
- KeyLogger for Linux Systems☆69Updated 3 years ago
- Discord botnet bot written in python☆10Updated 7 years ago
- Reverse Shell troll software☆12Updated 5 years ago
- post exploitation user monitoring tool☆19Updated 6 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆12Updated 2 years ago
- ☆28Updated 8 months ago
- ☆12Updated 5 years ago
- Basic tool to automate backdooring PE files☆54Updated 3 years ago
- LaravelN00b .env Scanner☆39Updated 5 years ago