infermiere / tg-ratLinks
π Advanced Rat controllable by a telegram bot with many commands and functions.
β16Updated 11 months ago
Alternatives and similar repositories for tg-rat
Users that are interested in tg-rat are comparing it to the libraries listed below
Sorting:
- Auto exploitation tool for CVE-2024-24401.β36Updated 8 months ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion π·β75Updated 3 months ago
- CHAOS RAT web panel path RCE PoCβ28Updated last year
- PassBreakerβ61Updated last year
- SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetrβ¦β16Updated 2 months ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, aβ¦β25Updated 2 years ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.β25Updated last month
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)β105Updated last year
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.β48Updated last year
- β13Updated last year
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (β¦β17Updated last year
- Kali Packerge Managerβ65Updated last year
- Gmail/GSuite account enumeration toolβ51Updated last year
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploitβ17Updated last year
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch buildsβ21Updated last year
- β14Updated last year
- CVE-2024-50603: Aviatrix Controller Unauthenticated Command Injectionβ16Updated 4 months ago
- Mass bruteforce authentication of common services with common credentials.β48Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.β61Updated 9 months ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.β19Updated last year
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a complβ¦β11Updated 4 months ago
- β14Updated 2 months ago
- an exploit of Server-side request forgery (SSRF)β50Updated 10 months ago
- Web Path Finderβ60Updated last year
- hacking toolsβ14Updated 2 years ago
- xdebug 2.5.5 RCE exploitβ31Updated 4 months ago
- Perform With Massive Wordpress Enumerationβ11Updated last year
- ProxyChecker Made in NodeJSβ37Updated 3 years ago
- CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Informationβ29Updated 10 months ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the Fβ¦β26Updated last year