josemlwdf / PyRATLinks
PyRAT is a powerful CTF (Capture The Flag) rootkit designed to be used in cybersecurity competitions and educational settings. It provides various capabilities for privilege escalation, and maintaining persistent access on compromised systems.
☆29Updated 9 months ago
Alternatives and similar repositories for PyRAT
Users that are interested in PyRAT are comparing it to the libraries listed below
Sorting:
- Demonized Shell is an Advanced Tool for persistence in linux.☆432Updated last year
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆118Updated 2 years ago
- Obtain the passphrase of a private key (id_rsa), this tool uses the ssh-keygen binary to perform a brute force attack until a successful …☆83Updated 7 months ago
- A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)☆51Updated last year
- Repo containing cracked red teaming tools.☆219Updated 3 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆348Updated last year
- Virtualized WiFi pentesting laboratory without the need for physical Wi-Fi cards, using mac80211_hwsim. Docker version of WiFiChallenge L…☆356Updated last week
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆284Updated 11 months ago
- notes and ramblings from my OSCP/PenTesting Studies☆96Updated 2 years ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆258Updated 10 months ago
- Automated exploit scanner for cameras on the internet☆218Updated last year
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆299Updated 2 years ago
- Koth - TryHackMe Tricks☆190Updated 2 years ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆115Updated 2 years ago
- Scripts for offensive security☆179Updated 8 months ago
- improving...☆253Updated 3 months ago
- Here are the most interesting Shodan dorks (according to me)☆102Updated 2 years ago
- my kali desktop setup☆321Updated last year
- List of payloads: reverse shell, bind shell, webshell.☆62Updated 2 months ago
- A WordPress plugin that provides reverse shell functionality with a graphical user interface (GUI) for configuration. This plugin allows …☆52Updated 2 months ago
- CTF enumeration tool. It facilitates the Network Pentest☆39Updated last month
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆92Updated 2 years ago
- Bookmarklet to find endpoints easily with one click☆75Updated last year
- Script for generating revshells☆479Updated last year
- Persistent Powershell backdoor tool {😈}☆122Updated last year
- CVE-2022-25765 pdfkit <0.8.6 command injection.☆15Updated 3 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated last year
- ☆45Updated 2 years ago
- Bash script to check for CVE-2022-0847 "Dirty Pipe"☆69Updated 2 years ago
- Exploits for some windows binaries :)☆53Updated 2 months ago