beescuit / njrat-attackLinks
This is a set of scripts and exploits for attacking njrat servers.
☆11Updated 2 years ago
Alternatives and similar repositories for njrat-attack
Users that are interested in njrat-attack are comparing it to the libraries listed below
Sorting:
- Tool to start a python http server in a simple way☆10Updated 3 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 5 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆48Updated 3 years ago
- Burn Byte is a modern and powerful DDOS Toolkit☆37Updated 4 years ago
- ☆13Updated 5 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Updated last year
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- 🚀 Builder of Malware Loader☆15Updated 4 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆12Updated 2 years ago
- The Fuzzil is a program which injects automatically data into a webpage and detect potential bugs.☆23Updated 5 years ago
- Malware and malicious applications database☆37Updated last year
- An advanced malware framework.☆10Updated 3 years ago
- Some Generic Browser Exploits (For Educational Purposes Only)☆30Updated 3 years ago
- ☆37Updated 3 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Updated 4 years ago
- Windows Reverse TCP backdoor☆29Updated 6 years ago
- Javascript keylogger with web panel☆18Updated last year
- ☆12Updated 5 years ago
- Remote Thread Injection by C# + Delegate Techniques☆12Updated 2 years ago
- Reverse Shell troll software☆12Updated 5 years ago
- Some stealers in one. Simple to use.☆6Updated 4 years ago
- HTTP/HTTPS based Golang botnet☆19Updated 3 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆28Updated 3 years ago
- ☣️ Simple Master Boot Record (MBR) override example☆15Updated 7 years ago
- Chrome Password Decryptor☆25Updated 3 years ago
- Simple keylogger written in C# which is ready for modifications.☆14Updated 3 years ago
- Check arbitrary file download vulnerability in the WordPress☆21Updated 5 years ago
- Let's try to create a rootkit!☆20Updated 5 years ago
- Cross-platform RAT, written in C☆86Updated 2 years ago
- Tool developed in Python 3 using Scapy for MITM attacks☆11Updated 4 years ago