byt3n33dl3 / TheFatRat_v2Links
TFRv2: Remote control access, used as a bypasser for anti-virus (software). Penetrate a FLAGSHIP such as Android, Windows, and macOS.
☆116Updated last year
Alternatives and similar repositories for TheFatRat_v2
Users that are interested in TheFatRat_v2 are comparing it to the libraries listed below
Sorting:
- Offensive Samurai : Android Accesses remotely on CLI.☆38Updated 11 months ago
- A Survival Knife (Fantastic) Force Attacks, Incorporating Teeth Cybertooth && John the Ripper, most Advanced Password and Logon Cracker.☆82Updated 7 months ago
- An Ounce of Notorious Smartphones Antler Bullet. Penetrate iOS and Android☆193Updated 9 months ago
- The most advanced GUI Frontend RAT for MacOS and OSX distro using XPC's Exploitation.☆43Updated 10 months ago
- Pegasus, the Spyware that represents a significant Offensive Colonel.☆46Updated last year
- 𓆰𓆪 WannaCry 𝗥𝗮𝗻𝘀𝗼𝗺𝘄𝗮𝗿𝗲. This malware spread by using a vulnerability Exploit Called "EternalBlue".☆56Updated last year
- An Open source Pentesting Software for Mapping Injection points to Takeover.☆53Updated 8 months ago
- Automated Exploit scanners for public Camera, CCTV's, and Capture Devices.☆22Updated 9 months ago
- Enterprise level of Parallelization SSH (Concurrency), Logon Penetration Testing.☆26Updated 7 months ago
- Backdoor for Rubella on Shell's☆32Updated last year
- 🗝 BotNet ( .NET ) Source Codes☆14Updated last year
- Teeth - smilodon cybertooth is a password decryption utilities for online services & offline hashes, fastest and most advanced password c…☆48Updated last year
- Seven Degrees of Domain Admin☆84Updated 8 months ago
- Release Neo the Evil Ducky, A scripts into any Hardware or drive Devices.☆12Updated last year
- For radio frequency research severe damage to privacy or modify wireless devices.☆16Updated 10 months ago
- Obfuscated Pegasus Spyware.☆25Updated last year
- Juggernaut show Attacks for MFA from Apple ID.☆28Updated 10 months ago
- A swiss army Knife for Penetration testing Networks and Active Directory.☆44Updated 6 months ago
- Six Degrees of Enterprise Domain Admin☆27Updated last month
- Docker Payloads (Bypass) Data at the endpoint when running NestJS APK.☆17Updated last year
- Remote access Trojan based (Client) After the Malware hits the Kernel.☆11Updated last year
- Nikto the Alienware : Advance web scanner, Identify by scanning for Misconfigurations and Information disclosures.☆17Updated 11 months ago
- Prevent users from accessing online services. Distributed Denied of Service Attack server that cuts off targets or surrounding Infrastruc…☆10Updated last year
- (Cracking Authentication) Attacking a Services and attempts to exploit the MFA processes.☆19Updated last year
- Kerberos Attacks. EXECTRINITY focuses on the acquisition of TGS. Specifically operating under Active Directory.☆43Updated 10 months ago
- Weaponizing Nim, with the elegance of modern logic programming language. Nim can do that!?☆12Updated last year
- Six Degrees of Domain Admin☆55Updated 5 months ago
- Hooking frequency Sessions, a bundle of customs firmware and intensity of RF.☆13Updated last year
- NOC is an Integration Bypasser, Change PoC Binary to quirks of working with the LLVM.☆11Updated 11 months ago
- Ronin the Shogun for XSS and XSRF Attacks.☆14Updated 10 months ago