indetectables-net / rats-libraryView external linksLinks
RATs library 2003 to present
☆16Oct 14, 2023Updated 2 years ago
Alternatives and similar repositories for rats-library
Users that are interested in rats-library are comparing it to the libraries listed below
Sorting:
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆15Sep 8, 2023Updated 2 years ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Sep 10, 2022Updated 3 years ago
- A powerful hardware ID spoofing tool designed to modify system identifiers for privacy and security purposes. Change MAC addresses, HWID,…☆16Nov 26, 2025Updated 2 months ago
- $h!tty Skidded malwares I found online (warning - very cringe) Disclaimer: Most of them still dangerous. This repo is for educational pur…☆30Oct 12, 2023Updated 2 years ago
- rat tool 🔥 remote control tool remote control bot remote access tool rat tool ratting 🔥mqbjwcybsg☆11Oct 31, 2024Updated last year
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- This Python script can enumerate all URLs present in robots.txt files, and test whether they can be accessed or not.☆47Feb 11, 2025Updated last year
- Termux - a terminal emulator application for Android OS extendible by variety of packages.☆11Jan 8, 2023Updated 3 years ago
- This is a simple MD5 Hash Cracker tool to decrypt it. The usage is :☆11Dec 29, 2018Updated 7 years ago
- LulzSec FB Cracker ToolKit Bruter V0.1 tool written in perl to perform a dictionary-based attack on a specific Facebook user through HTTP…☆11Aug 14, 2017Updated 8 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Let's you use any Windscribe server over a HTTP proxy. Uses Docker so multiple HTTP proxies at different locations can be created on the …☆12Jan 4, 2019Updated 7 years ago
- This is a repository for storing all of the scripts, documentation, binaries, etc. required to setup a Samsung Galaxy Note 10.1 2014 Edit…☆11Oct 17, 2020Updated 5 years ago
- My stuff regarding Copilot for Security☆12Jan 12, 2026Updated last month
- Just my findings of malwares☆43Aug 26, 2022Updated 3 years ago
- Same @Mebus/cupp tool but best speed and Creates every possible word using the information you provide.☆18Nov 30, 2025Updated 2 months ago
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 3 years ago
- The application is a PoC that helps in identifying modern bankers, potentially malicious and remote controlling applications abusing Andr…☆43Jan 14, 2025Updated last year
- terminal customization☆10Dec 17, 2022Updated 3 years ago
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- Microsoft Defender for Cloud attack simulation toolkit☆23Dec 24, 2024Updated last year
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- A simple lyrics editor (generator and organizer as well) for .LRC files.☆11Oct 27, 2023Updated 2 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/auto-reaver☆13Mar 22, 2015Updated 10 years ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago
- ☆10Aug 31, 2021Updated 4 years ago
- Find all valid unlock pin pattern for android phone for a 3 by 3 grid☆10Aug 16, 2019Updated 6 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a firewall-evading backdoor, and reroutin…☆10Dec 23, 2014Updated 11 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 10 years ago
- ☆12Feb 9, 2025Updated last year
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- My own custom payloads for any BAD USB. (These payloads work perfectly with Arduino, Pi Pico, & Rubber Ducky.☆13Jan 19, 2023Updated 3 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- Node module to easily lookup city and state for a US zipcode☆14Dec 28, 2013Updated 12 years ago