indetectables-net / rats-libraryView external linksLinks
RATs library 2003 to present
☆16Oct 14, 2023Updated 2 years ago
Alternatives and similar repositories for rats-library
Users that are interested in rats-library are comparing it to the libraries listed below
Sorting:
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆15Sep 8, 2023Updated 2 years ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Sep 10, 2022Updated 3 years ago
- A powerful hardware ID spoofing tool designed to modify system identifiers for privacy and security purposes. Change MAC addresses, HWID,…☆16Nov 26, 2025Updated 2 months ago
- $h!tty Skidded malwares I found online (warning - very cringe) Disclaimer: Most of them still dangerous. This repo is for educational pur…☆30Oct 12, 2023Updated 2 years ago
- rat tool 🔥 remote control tool remote control bot remote access tool rat tool ratting 🔥mqbjwcybsg☆11Oct 31, 2024Updated last year
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- This Python script can enumerate all URLs present in robots.txt files, and test whether they can be accessed or not.☆47Feb 11, 2025Updated last year
- Just my findings of malwares☆43Aug 26, 2022Updated 3 years ago
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 3 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- This is a repository for storing all of the scripts, documentation, binaries, etc. required to setup a Samsung Galaxy Note 10.1 2014 Edit…☆11Oct 17, 2020Updated 5 years ago
- LulzSec FB Cracker ToolKit Bruter V0.1 tool written in perl to perform a dictionary-based attack on a specific Facebook user through HTTP…☆11Aug 14, 2017Updated 8 years ago
- Same @Mebus/cupp tool but best speed and Creates every possible word using the information you provide.☆18Nov 30, 2025Updated 2 months ago
- This is a simple MD5 Hash Cracker tool to decrypt it. The usage is :☆11Dec 29, 2018Updated 7 years ago
- Let's you use any Windscribe server over a HTTP proxy. Uses Docker so multiple HTTP proxies at different locations can be created on the …☆12Jan 4, 2019Updated 7 years ago
- My stuff regarding Copilot for Security☆12Jan 12, 2026Updated last month
- Termux - a terminal emulator application for Android OS extendible by variety of packages.☆11Jan 8, 2023Updated 3 years ago
- The application is a PoC that helps in identifying modern bankers, potentially malicious and remote controlling applications abusing Andr…☆43Jan 14, 2025Updated last year
- ☆11Mar 19, 2019Updated 6 years ago
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 3 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- Aruba Instant (IAP) - Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- ☆12Apr 20, 2025Updated 9 months ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 3 years ago
- Node module to easily lookup city and state for a US zipcode☆14Dec 28, 2013Updated 12 years ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 14 years ago
- Metasploit RPC controller application☆11Aug 20, 2018Updated 7 years ago
- Python utility to export a user's starred repositories list into a CSV file☆17May 3, 2018Updated 7 years ago
- A simple lyrics editor (generator and organizer as well) for .LRC files.☆11Oct 27, 2023Updated 2 years ago
- Scanner for Log4j RCE CVE-2021-44228☆11Jul 6, 2022Updated 3 years ago
- ☆13Jan 24, 2025Updated last year
- terminal customization☆10Dec 17, 2022Updated 3 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- ☆20Feb 22, 2021Updated 4 years ago
- iOS forensics utility☆12May 8, 2018Updated 7 years ago