infermiere / tg-ratLinks
π Advanced Rat controllable by a telegram bot with many commands and functions.
β16Updated last year
Alternatives and similar repositories for tg-rat
Users that are interested in tg-rat are comparing it to the libraries listed below
Sorting:
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion π·β80Updated 6 months ago
- Auto exploitation tool for CVE-2024-24401.β35Updated 11 months ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)β110Updated 2 years ago
- BackdoorSim: An Educational into Remote Administration Toolsβ106Updated last year
- Simple Powershell Http shell With WEB UIβ72Updated 5 months ago
- Here are +200 different rats some with source codeβ112Updated last year
- BurnWP Advanced Exploiter System instead Scanner & Custom Plugin for Pentesterβ34Updated last week
- PassBreakerβ63Updated last year
- Kali Packerge Managerβ65Updated last year
- backdoor exploit for vsftpd 2.3.4 on pythonβ15Updated last year
- A fast subdomain takeover toolβ82Updated last year
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.β48Updated last month
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pagβ¦β123Updated 2 years ago
- Mass bruteforce authentication of common services with common credentials.β48Updated last year
- SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetrβ¦β16Updated last month
- CHAOS RAT web panel path RCE PoCβ29Updated last year
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.β50Updated 4 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.β62Updated last year
- A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and β¦β39Updated last year
- POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692β41Updated 5 months ago
- Will attempt to retrieve DB details for FastAdmin instancesβ67Updated last year
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorizationβ43Updated last year
- exploit for cve-2023-47246 SysAid RCE (shell upload)β51Updated last year
- CVE-2024-28955 Exploitation PoCβ34Updated last year
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.β81Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β65Updated last year
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.β25Updated 4 months ago
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.β45Updated last year
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability assβ¦β41Updated this week
- ParamWizard is a powerful Python-based tool designed for extracting and identifying URLs with parameters from a specified website. It proβ¦β64Updated 11 months ago