infermiere / tg-ratLinks
🙊 Advanced Rat controllable by a telegram bot with many commands and functions.
☆16Updated last year
Alternatives and similar repositories for tg-rat
Users that are interested in tg-rat are comparing it to the libraries listed below
Sorting:
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆11Updated 5 months ago
- Auto exploitation tool for CVE-2024-24401.☆36Updated 9 months ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆76Updated 4 months ago
- Simple Powershell Http shell With WEB UI☆71Updated 2 months ago
- 🦎Triton_RAT is free and easy to use, one of the best remote administration tools written in Python, fully integrated with Telegram🦎☆54Updated last week
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Updated last year
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆107Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- Here are +200 different rats some with source code☆100Updated last year
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- A simple script to obfuscate batch(bat) code easily☆24Updated last year
- PassBreaker☆63Updated last year
- Gmail/GSuite account enumeration tool☆51Updated last year
- CHAOS RAT web panel path RCE PoC☆28Updated last year
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆42Updated 8 months ago
- Generate FUD Droppers that are undetectable by popular AV's☆30Updated last year
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- Mass bruteforce authentication of common services with common credentials.☆48Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Updated 10 months ago
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆17Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- ☆13Updated last year
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆25Updated 2 months ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆25Updated 2 years ago
- an exploit of Server-side request forgery (SSRF)☆49Updated 10 months ago
- FIshShell is a multi-session handler and Windows & Linux backdoor payload generator. It allows users\targets to connect to the server (ot…☆8Updated last year
- Crypter/Stub/Downloader for payloads and malware, bypassing all AV and achiving a score of 0/60 detections on virus total☆9Updated last year