josemlwdf / PyRATLinks
PyRAT is a powerful CTF (Capture The Flag) rootkit designed to be used in cybersecurity competitions and educational settings. It provides various capabilities for privilege escalation, and maintaining persistent access on compromised systems.
☆29Updated 8 months ago
Alternatives and similar repositories for PyRAT
Users that are interested in PyRAT are comparing it to the libraries listed below
Sorting:
- Demonized Shell is an Advanced Tool for persistence in linux.☆431Updated last year
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆118Updated last year
- Repo containing cracked red teaming tools.☆215Updated 2 months ago
- A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)☆50Updated last year
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆345Updated last year
- Obtain the passphrase of a private key (id_rsa), this tool uses the ssh-keygen binary to perform a brute force attack until a successful …☆82Updated 6 months ago
- notes and ramblings from my OSCP/PenTesting Studies☆96Updated 2 years ago
- The Havoc Framework☆63Updated 3 years ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆114Updated 2 years ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆300Updated 2 years ago
- Automated exploit scanner for cameras on the internet☆215Updated last year
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆257Updated 9 months ago
- Bash script to check for CVE-2022-0847 "Dirty Pipe"☆68Updated 2 years ago
- List of payloads: reverse shell, bind shell, webshell.☆61Updated last month
- CTF writeups - Tryhackme, HackTheBox, Vulnhub☆44Updated 4 years ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆91Updated 2 years ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆131Updated last year
- Script for generating revshells☆477Updated last year
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆108Updated last year
- Bookmarklet to find endpoints easily with one click☆74Updated last year
- Scripts for offensive security☆177Updated 7 months ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆67Updated last year
- Virtualized WiFi pentesting laboratory without the need for physical Wi-Fi cards, using mac80211_hwsim. Docker version of WiFiChallenge L…☆349Updated last week
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆15Updated 2 years ago
- Testing POC for use cases☆24Updated last year
- SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. I…☆162Updated last year
- Red Teaming tools and techniques☆56Updated 2 years ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆66Updated last year
- A wordlist repository with human-curated and reviewed content.☆121Updated 2 years ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆241Updated last year