A Python 3 standalone Windows 10 / Linux Rootkit using Tor.
☆179Nov 25, 2022Updated 3 years ago
Alternatives and similar repositories for tor-rootkit
Users that are interested in tor-rootkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Sep 9, 2021Updated 4 years ago
- Program for remote computer management with Telegram on native C++ - by B4DB4B3☆116May 30, 2021Updated 4 years ago
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆22Oct 2, 2021Updated 4 years ago
- ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication☆1,024Mar 13, 2023Updated 3 years ago
- 100% Undetectable NodeJS reverse shell backdoor that autoruns on startup.☆24Feb 25, 2022Updated 4 years ago
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆941Mar 29, 2022Updated 3 years ago
- Work in Progress repo☆16Apr 18, 2019Updated 6 years ago
- [WIP] A free and open-source, modular Remote Administration Tool (RAT) / Payload Dropper written in Go(lang) with a flexible command and …☆231Dec 3, 2023Updated 2 years ago
- Web Service write in Python for control and protect your android device remotely.☆191Dec 14, 2022Updated 3 years ago
- A Python based RAT 🐀 (Remote Access Trojan) for getting reverse shell 🖥️☆917Dec 9, 2023Updated 2 years ago
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated 2 weeks ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 4 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Dec 6, 2023Updated 2 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆16Jun 30, 2020Updated 5 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Jul 26, 2021Updated 4 years ago
- Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.☆2,109Feb 19, 2026Updated last month
- ViperVenom is an open-source cyber offensive tool developed by Itay Funes for pentesters. ViperVenom is a great tool when it comes to pen…☆14Feb 2, 2022Updated 4 years ago
- ☆13Jun 10, 2022Updated 3 years ago
- 👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)☆24Feb 11, 2022Updated 4 years ago
- Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)☆463Jul 15, 2022Updated 3 years ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆94May 15, 2021Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!☆25Jan 8, 2026Updated 2 months ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- ☆10Sep 3, 2021Updated 4 years ago
- RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model,…☆279Apr 6, 2021Updated 4 years ago
- CVE-2021-40346 integer overflow enables http smuggling☆32Sep 28, 2021Updated 4 years ago
- A .NET binary loader that bypasses AMSI☆45Sep 20, 2021Updated 4 years ago
- Self‑healing Gossip Mesh C2 with Assisted Peer Discovery, Modular Post‑Exploitation, and OPSEC‑Focused Transport☆1,694Updated this week
- Assist reverse tcp shells in post-exploration tasks☆220Oct 17, 2025Updated 5 months ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.☆328Nov 2, 2024Updated last year
- cross-platform C2 framework in python 2☆38May 19, 2022Updated 3 years ago
- Decentralised P2P botnet using toxcore.☆183Feb 8, 2026Updated last month
- It contains malicious features that can steal files from BitRAT tools.☆12Dec 19, 2021Updated 4 years ago
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆469Mar 8, 2023Updated 3 years ago
- C++ implant that interfaces with a SK8PARK server☆49Jun 28, 2021Updated 4 years ago