cinaaaa / HIROOLinks
π HIROO is an FUD Remote Administration Tool (RAT) Generator
β17Updated 5 years ago
Alternatives and similar repositories for HIROO
Users that are interested in HIROO are comparing it to the libraries listed below
Sorting:
- Use Invoke-PSImage to deliver a payload in an Imageβ52Updated 7 years ago
- Exploitation Tool For Windows Using Batch and Powershellβ22Updated 7 months ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.β27Updated 5 years ago
- CryptoTrojan in Python (For educational purpose ONLY)β50Updated 7 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.β15Updated 3 years ago
- Automated encryption utilities and installationβ12Updated 4 years ago
- Repository of tools used in my blogβ51Updated last year
- Collection of cracked malwareβ14Updated 6 years ago
- Quick and simple alghorithm to search in leaks very fast modeβ11Updated 6 years ago
- Remote Access Trojan(RAT), Miner, DDoSβ34Updated 8 years ago
- KeplerPulse is a tool that generates a Powershell command that once executed on a Machine, Downloads and executes your desired Executableβ¦β10Updated 3 years ago
- Python Remote Access Toolβ26Updated 5 years ago
- All xxx-arsenal repos in oneβ16Updated 6 years ago
- facebook bot ,like comment,download phone number, download email adress, delect all friends ...........etcβ20Updated 6 years ago
- Simple backdoor for public places, that uses a file system for communication. Just for fun! πβ55Updated 5 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.β15Updated 9 years ago
- SkyRAT - Powershell Remote Administration Toolβ33Updated 7 years ago
- Scan suspicious applications with over 60 different anti-viruses with a mere two clicks and five seconds!β40Updated 2 years ago
- electron app with remote access tool (RAT) functionalityβ8Updated 7 years ago
- A Simple Keyloggerβ18Updated 6 years ago
- Scan a URL against a list of dorks to check for vulnerabilities.β10Updated 8 years ago
- π¨π»βπ» A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.β41Updated 4 years ago
- A localhost implementation of a botnet used to perform a credential stuffing attackβ13Updated 4 years ago
- Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less bβ¦β26Updated 6 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NETβ21Updated 5 years ago
- Identify connection of sessions for social engineering attacks.β57Updated 8 years ago
- Send Email Bomber Anonymously Using Ur Account Yahoo Or Gmailβ39Updated 4 years ago
- iSpy Keyloggerβ43Updated 8 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.β18Updated 7 years ago
- Crackhash is a tool that try to crack different types of hashes using free online services.β25Updated 5 years ago