byt3n33dl3 / TheFatRat_v2
TFRv2 : Remote control Access, used as a Bypasser for Anti Virus (Software) and Penetrate a FLAGSHIP Such as Android, Windows, and MacOS.
☆74Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for TheFatRat_v2
- A Survival Knife (Fantastic) Force Attacks, Incorporating Teeth Cybertooth && John the Ripper, most Advanced Password and Logon Cracker.☆62Updated this week
- Offensive Samurai : Android Accesses remotely on CLI.☆33Updated 4 months ago
- 𓆰𓆪 WannaCry 𝗥𝗮𝗻𝘀𝗼𝗺𝘄𝗮𝗿𝗲. This malware spread by using a vulnerability Exploit Called "EternalBlue".☆43Updated 6 months ago
- ⛓️💥 Notorious Smartphones Malware for Remote administrator, including Advanced Spyware functions. EXECUTE iOS and Android, their Sandbo…☆115Updated last month
- Backdoor for Rubella on Shell's☆32Updated 6 months ago
- The most advanced GUI Frontend RAT for MacOS and OSX distro. Penetrate the SSL and Security system of Unix.☆30Updated 2 months ago
- Automated Exploit scanners for public Cameras, CCTV's, Devices Cam, Etc. Exploitation tool, Trust Attacks.☆16Updated last month
- Remote access Trojan based (Client) After the Malware hits the Kernel.☆11Updated 4 months ago
- Open source Penetration Testing Software for Automatic Injection attacks, Exploiting query Flaws and Taking over of Database servers.☆41Updated 3 weeks ago
- Teeth - smilodon cybertooth is a password decryption utilities for online services & offline hashes, fastest and most advanced password c…☆43Updated 4 months ago
- Kerberos Attacks. EXECTRINITY focuses on the acquisition of TGS. Specifically operating under Active Directory.☆41Updated 2 months ago
- Seven Degrees of Domain Admin☆72Updated 3 weeks ago
- A Sharp Knife Data Collector for BloodHound and BlackMarlinExec.☆91Updated 3 months ago
- Six Degrees of Enterprise Domain Admin☆18Updated last month
- Rootkit and Kernel attack kit, 𝗜𝘀𝗮𝗯𝗲𝗹𝗹𝗮 program Enables Cyber Attacks to gain access from Machines without being detected.☆11Updated 4 months ago
- 🗝 BotNet ( .NET ) Source Codes☆14Updated 6 months ago
- Enterprise level of Parallelization SSH (Concurrency), Logon Penetration Testing.☆17Updated this week
- Nikto the Alienware : Advance web scanner, Identify by scanning for Misconfigurations and Information disclosures.☆18Updated 4 months ago
- A swiss army Knife for Penetration testing Networks and Active Directory.☆32Updated 3 weeks ago
- Ronin the Shogun is an Automatic Cross site injection attacks (XSS) for Cookie and ID Hunter. JavaScript and TypeScript Payloads library.☆15Updated 2 months ago
- Release Neo the Evil Ducky, A scripts into any Hardware or drive Devices.☆12Updated 4 months ago
- Six Degrees of Domain Admin☆43Updated 2 months ago
- 𝗡.𝗢.𝗖 is an Integration Bypasser, Change PoC Binary to quirks of working with the LLVM.☆12Updated 4 months ago
- Prevent users from accessing online services. Distributed Denied of Service Attack server that cuts off targets or surrounding Infrastruc…☆10Updated 5 months ago
- Apple iD & Credentials BruteForcer. iCloud Apple ID Dictionary Attack that Bypasses Account Lockout restrictions and Secondary Authentica…☆19Updated 2 months ago
- Hooking frequency Sessions, a bundle of customs firmware. A high intensity of RF.☆13Updated 4 months ago
- Kerberos Attacks From Networks or Domain controller log Perspective. 𝗖𝗿𝗮𝗰𝗞𝗲𝗿𝗕𝗹𝗶𝘁𝘇 Involves the use of <rc4_hmac> in Kerberos …☆26Updated 4 months ago
- Docker Payloads (Bypass) Data at the endpoint when running NestJS Application inside the Container.☆16Updated 5 months ago
- ( Cracking Authentication ) Attacking a Services and attempts to exploit the Authentication process.☆17Updated 4 months ago
- Weaponizing Nim, with the elegance of modern logic programming language. Nim can do that!?☆12Updated 5 months ago