josemlwdf / PyRATLinks
PyRAT is a powerful CTF (Capture The Flag) rootkit designed to be used in cybersecurity competitions and educational settings. It provides various capabilities for privilege escalation, and maintaining persistent access on compromised systems.
☆27Updated 8 months ago
Alternatives and similar repositories for PyRAT
Users that are interested in PyRAT are comparing it to the libraries listed below
Sorting:
- Demonized Shell is an Advanced Tool for persistence in linux.☆427Updated 11 months ago
- Repo containing cracked red teaming tools.☆209Updated last month
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆343Updated last year
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆118Updated last year
- Virtualized WiFi pentesting laboratory without the need for physical Wi-Fi cards, using mac80211_hwsim. Docker version of WiFiChallenge L…☆333Updated last week
- notes and ramblings from my OSCP/PenTesting Studies☆96Updated 2 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated 11 months ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆73Updated 2 years ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆110Updated 2 years ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆91Updated last year
- Scripts for offensive security☆176Updated 6 months ago
- The Havoc Framework☆61Updated 3 years ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆134Updated 2 weeks ago
- A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)☆51Updated last year
- ☆306Updated last year
- PowerShell Obfuscator☆223Updated 3 months ago
- Obtain the passphrase of a private key (id_rsa), this tool uses the ssh-keygen binary to perform a brute force attack until a successful …☆80Updated 5 months ago
- A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them bi…☆494Updated last month
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆136Updated last year
- Embed a payload inside a PNG file☆363Updated last year
- What the name says....☆104Updated last year
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆281Updated 9 months ago
- Testing POC for use cases☆23Updated last year
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆126Updated 7 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆258Updated 8 months ago
- tricks I discovered while playing king of the hill☆17Updated 2 years ago
- List of payloads: reverse shell, bind shell, webshell.☆59Updated last month
- This project is aimed at freely providing technical guides on various hacking tools.☆119Updated last year
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆300Updated last year
- Takeover Account OpenSSH☆36Updated last year