byt3n33dl3 / Crawler_v2
Remote access trojan, RAT tools for penetration testing on a devices, access real time with client devices after the malware hits the kernels.
โ10Updated 4 months ago
Related projects โ
Alternatives and complementary repositories for Crawler_v2
- Rootkit and Kernel attack kit, ๐๐๐ฎ๐ฏ๐ฒ๐น๐น๐ฎ program will enables cyber attacks to gain access to and infiltrate data from machines wiโฆโ10Updated 3 months ago
- Configurations and Deprecated payloads. Some useful scripts for Cobaltstrike.โ13Updated 3 months ago
- Six Degrees of Enterprise Domain Adminโ13Updated last month
- Advance web scanner, It's Designed to identify various Security vulnerabilities in web applications by scanning for misconfigurations, inโฆโ15Updated 3 months ago
- ๐ฐ๐ช WannaCry ๐ฅ๐ฎ๐ป๐๐ผ๐บ๐๐ฎ๐ฟ๐ฒ. This malware spread by using a vulnerability exploit called 'EternalBlue'. The US National Security Aโฆโ41Updated 5 months ago
- Docker Payload ( Bypass anti virus ). Payload data at the endpoint when running NestJS application inside a Docker container.โ16Updated 4 months ago
- ๐ BotNet ( .NET ) Source Codesโ13Updated 6 months ago
- Worm roulette, a Miscellaneous tools for Gambllers. Don't do it guysโ8Updated 4 months ago
- offshore is the most brutal and advance host hunter, ready and steady for rubella ( 7R0J4N ) trojan infections to be spreaded. Bypass sevโฆโ19Updated 4 months ago
- This malware is often used to form Botnets, enabling initial access for the Cyber Attacks Ransomware or Ryuk banking Trojan. CARNOTAURUS โฆโ31Updated 6 months ago
- Trojan GUI && display panelโ11Updated 4 months ago
- Open source Penetration Testing Software for automatic Injection attacks, Exploiting query Injections flaw and Taking over of Database seโฆโ38Updated 2 weeks ago
- For radio frequency research ( RF attack ) this script can cause severe damage to an individual's privacy ( trust-attack ) by enabling atโฆโ12Updated 2 months ago
- Teeth - smilodon cybertooth is a password decryption utilities for online services & offline hashes, fastest and most advanced password cโฆโ41Updated 3 months ago
- ๐ก.๐ข.๐ is a source code to bypass antivirus, Change some strings in the PoC binary or script to get it pass the AV. This can be a time โฆโ10Updated 3 months ago
- Perform a ( hard-core ) force attack to get the correct credentials in under one minute, with the help of ๐ง๐ฒ๐ฒ๐๐ต cybertooth && ๐๐ผ๐ตโฆโ60Updated 4 months ago
- Seven Degrees of Domain Adminโ70Updated 2 weeks ago
- Offensive Remote Access for any smartphones, most advanced on Android. crowdown is software that gives a person full control of another pโฆโ26Updated 3 months ago
- The most advanced GUI frontend && CLI RAT for MacOS and OSX distro, Remote Access Tool. Penetrate the SSL and Security system of Unix witโฆโ21Updated last month
- TheFatRat : Remote control Access Devices and exploiting tool, used as a deadly Backdoor generator that bypass most anti virus software. โฆโ65Updated 4 months ago
- Pegasus, the Spyware that represents a significant threat to Privacy and Security, showcasing the capabilities of modern surveillance tecโฆโ23Updated 4 months ago
- โ๏ธโ๐ฅ Notorious Smartphones Malware, for Remote Administration and Access tools, Which include Remote Device control and advanced Spywareโฆโ101Updated last month
- Apple iD & Credentials BruteForcer. iCloud Apple ID Dictionary Attack that Bypasses Account Lockout restrictions and Secondary Authenticaโฆโ12Updated 2 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactionsโ265Updated 3 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-buiโฆโ154Updated 2 weeks ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASSโ201Updated 2 weeks ago
- โ125Updated 3 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reductiโฆโ190Updated 5 months ago
- BOF to steal browser cookies & credentialsโ220Updated this week
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, fโฆโ148Updated 5 months ago