josemlwdf / PyRATLinks
PyRAT is a powerful CTF (Capture The Flag) rootkit designed to be used in cybersecurity competitions and educational settings. It provides various capabilities for privilege escalation, and maintaining persistent access on compromised systems.
☆26Updated 7 months ago
Alternatives and similar repositories for PyRAT
Users that are interested in PyRAT are comparing it to the libraries listed below
Sorting:
- Obtain the passphrase of a private key (id_rsa), this tool uses the ssh-keygen binary to perform a brute force attack until a successful …☆82Updated 5 months ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆117Updated last year
- Demonized Shell is an Advanced Tool for persistence in linux.☆427Updated 10 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆341Updated last year
- Repo containing cracked red teaming tools.☆208Updated 3 weeks ago
- A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)☆49Updated last year
- Testing POC for use cases☆19Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆67Updated 4 years ago
- AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effecti…☆40Updated 6 months ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆109Updated 2 years ago
- SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. I…☆161Updated last year
- Bypass 403☆163Updated 9 months ago
- What the name says....☆103Updated last year
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆281Updated 8 months ago
- Scripts for offensive security☆171Updated 6 months ago
- notes and ramblings from my OSCP/PenTesting Studies☆95Updated 2 years ago
- Automated exploit scanner for cameras on the internet☆208Updated last year
- Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim. Docker version of WiFiChallenge La…☆326Updated last week
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆241Updated last year
- ☆160Updated 2 years ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Updated last year
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆529Updated last year
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆258Updated 7 months ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆38Updated last year
- Koth - TryHackMe Tricks☆186Updated 2 years ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆90Updated last year
- Simple and accurate guide for linux privilege escalation tactics☆262Updated last year
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆132Updated last month
- Here are the most interesting Shodan dorks (according to me)☆95Updated last year
- improving...☆230Updated last month