A Python 3 standalone Windows 10 / Linux Rootkit using Tor.
☆179Nov 25, 2022Updated 3 years ago
Alternatives and similar repositories for tor-rootkit
Users that are interested in tor-rootkit are comparing it to the libraries listed below
Sorting:
- ☆16Sep 9, 2021Updated 4 years ago
- Program for remote computer management with Telegram on native C++ - by B4DB4B3☆115May 30, 2021Updated 4 years ago
- Web Service write in Python for control and protect your android device remotely.☆190Dec 14, 2022Updated 3 years ago
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆22Oct 2, 2021Updated 4 years ago
- ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication☆1,024Mar 13, 2023Updated 2 years ago
- cross-platform C2 framework in python 2☆38May 19, 2022Updated 3 years ago
- A Python based RAT 🐀 (Remote Access Trojan) for getting reverse shell 🖥️☆912Dec 9, 2023Updated 2 years ago
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆936Mar 29, 2022Updated 3 years ago
- Red Team C2 and Post Exploitation code☆35Jul 8, 2025Updated 7 months ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Jul 26, 2021Updated 4 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 3 years ago
- Assist reverse tcp shells in post-exploration tasks☆219Oct 17, 2025Updated 4 months ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Dec 6, 2023Updated 2 years ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- ViperVenom is an open-source cyber offensive tool developed by Itay Funes for pentesters. ViperVenom is a great tool when it comes to pen…☆14Feb 2, 2022Updated 4 years ago
- Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)☆464Jul 15, 2022Updated 3 years ago
- ☆10Sep 3, 2021Updated 4 years ago
- [WIP] A free and open-source, modular Remote Administration Tool (RAT) / Payload Dropper written in Go(lang) with a flexible command and …☆230Dec 3, 2023Updated 2 years ago
- Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.☆2,101Feb 19, 2026Updated last week
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- With the help of this automated script, you will never lose track of recently released CVEs.☆53Feb 19, 2022Updated 4 years ago
- 100% Undetectable NodeJS reverse shell backdoor that autoruns on startup.☆24Feb 25, 2022Updated 4 years ago
- A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!☆25Jan 8, 2026Updated last month
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- A .NET binary loader that bypasses AMSI☆45Sep 20, 2021Updated 4 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Dec 2, 2020Updated 5 years ago
- Automate Auxiliary Module in Metasploit☆17Apr 18, 2021Updated 4 years ago
- RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model,…☆280Apr 6, 2021Updated 4 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- CVE-2021-40346 integer overflow enables http smuggling☆32Sep 28, 2021Updated 4 years ago
- A Remote Administration Tool (RAT) for Windows written in C++ with a fancy C.L.I.☆61Sep 27, 2023Updated 2 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆162Dec 19, 2021Updated 4 years ago
- ParadoxiaRat : Native Windows Remote access Tool.☆821Apr 18, 2023Updated 2 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆93May 15, 2021Updated 4 years ago
- KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detecti…☆359Jul 15, 2023Updated 2 years ago
- CobaltStrike4.5 Sleeve解密文件,搬砖加一点点修改, 仅作备份使用.☆34Jun 17, 2022Updated 3 years ago
- Self‑healing Gossip Mesh C2 with Assisted Peer Discovery, Modular Post‑Exploitation, and OPSEC‑Focused Transport☆1,691Feb 25, 2026Updated last week
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆527Dec 18, 2024Updated last year