beescuit / njrat-attackLinks
This is a set of scripts and exploits for attacking njrat servers.
β13Updated 3 years ago
Alternatives and similar repositories for njrat-attack
Users that are interested in njrat-attack are comparing it to the libraries listed below
Sorting:
- Bifrost C2. Open-source post-exploitation using Discord APIβ48Updated 4 years ago
- π Builder of Malware Loaderβ13Updated 5 years ago
- Malware and malicious applications databaseβ38Updated last year
- Cross-platform RAT, written in Cβ88Updated 3 years ago
- Burn Byte is a modern and powerful DDOS Toolkitβ36Updated 4 years ago
- β37Updated 4 years ago
- Advanced Vulnerability Scanner Toolβ69Updated last year
- Build a Mirai botnet from the source code.β43Updated 6 years ago
- Tool to start a python http server in a simple wayβ10Updated 3 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.β177Updated 3 years ago
- Some Generic Browser Exploits (For Educational Purposes Only)β30Updated 4 years ago
- Yet Another PHP Shell - The most complete PHP reverse shellβ82Updated 3 years ago
- Javascript keylogger with web panelβ20Updated 2 years ago
- VySecator Is a Python Script Obfuscation Tool, Which can be used to Obfuscate your hand written Malwares and your Hand Written Scripts!β72Updated last year
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.β23Updated 5 years ago
- A semi-automatic osint/recon framework.β24Updated last year
- Repository of tools used in my blogβ51Updated last year
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHPβ25Updated 3 years ago
- UAC Bypass for windowsβ38Updated 5 years ago
- A very weird RATβ19Updated 3 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatibleβ76Updated 6 years ago
- Exploit for the vulnerability null pointer derefrence to in XWorm RATβ17Updated 10 months ago
- Hash Checker Bypass and Process Hackerβ18Updated 4 years ago
- RedLine stealer Source Code (Decompiled)β71Updated 5 years ago
- π§ C# UAC Bypass technique using mock directories π§β28Updated 3 years ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.β82Updated 4 years ago
- Cryline project - It's a simple test ransomware for Windows OS without stable encryption. Pls use this source code for study purposes onβ¦β58Updated 8 months ago
- β16Updated 2 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.β92Updated 4 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.β50Updated 4 years ago