PyRAT is a powerful CTF (Capture The Flag) rootkit designed to be used in cybersecurity competitions and educational settings. It provides various capabilities for privilege escalation, and maintaining persistent access on compromised systems.
☆29Apr 15, 2025Updated last year
Alternatives and similar repositories for PyRAT
Users that are interested in PyRAT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CTF enumeration tool. It facilitates the Network Pentest☆40Jan 4, 2026Updated 3 months ago
- an informative progress bar for Python 2+3 command-line tools☆12Nov 18, 2019Updated 6 years ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- Search Termux Commands and Guide in Termux !!☆12Updated this week
- Obtain a user's system password, this tool uses the su binary to perform a brute force attack until a successful collision occurs.☆52Mar 24, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7☆16Feb 1, 2026Updated 2 months ago
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆130Sep 7, 2023Updated 2 years ago
- CVE-2019-16113 - bludit >= 3.9.2 RCE authenticate☆13Jun 5, 2020Updated 5 years ago
- "VMBreaker" is a specialized tool for virtual machine security testing, offering essential, user-friendly features for efficient penetrat…☆13Apr 15, 2024Updated 2 years ago
- ☆10Updated this week
- JSNotify is a Python script designed to monitor JavaScript files in a specified directory for changes. This tool can be used by developer…☆18Nov 15, 2023Updated 2 years ago
- Chinese mirror of Tryhackme tutorials☆16Dec 11, 2025Updated 4 months ago
- Application features: Sets visibility of its own executeable file to hidden --> Adds itself to the registry of run-on-startup application…☆11Jan 30, 2019Updated 7 years ago
- Start the Windows Subsystem for Android with one click☆13Jan 26, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Privilege escalation to root using sudo chroot, NO NEED for gcc installed.☆48Oct 6, 2025Updated 6 months ago
- Force `go get` to make shallow clone and pulls☆11May 3, 2018Updated 7 years ago
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Mar 13, 2024Updated 2 years ago
- Tool to parse Stealer Logs.☆20Aug 2, 2023Updated 2 years ago
- A Hacking and Pentesting Tool for Windows☆20Jul 17, 2025Updated 8 months ago
- Sample apps taken from Windows Server 2003 and running in Docker Windows containers☆16Aug 24, 2018Updated 7 years ago
- ANDRAX Advanced Penetration Testing Platform for Android Smartphones☆32Jan 11, 2023Updated 3 years ago
- CVE-2022-1292 OpenSSL c_rehash Vulnerability - POC☆28Jul 20, 2022Updated 3 years ago
- Unauthenticated RCE in ZoneMinder Snapshots - Poc Exploit☆23May 7, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Some files which I want to share☆14May 29, 2024Updated last year
- A repo of my talks☆11Nov 28, 2023Updated 2 years ago
- NoBlindi is a command-line tool for exploiting blind NoSQL injection vulnerabilities to recover passwords in web applications.☆28Nov 12, 2023Updated 2 years ago
- A flexible cross-platform post-exploitation agent written in Go with basic functionalities☆17Mar 27, 2019Updated 7 years ago
- A small server to receive files over HTTP☆15Nov 30, 2023Updated 2 years ago
- Simple tool to dump/hide services in services.exe process.☆14Apr 22, 2022Updated 3 years ago
- A free antivirus aggregation software like VirusTotal.☆13Dec 3, 2019Updated 6 years ago
- This will help you to connect to your phone ( or any phone in general ) remotely using scrcpy☆16Aug 28, 2020Updated 5 years ago
- CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2)☆31Jul 11, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A small and portable Windows C library for sandbox detection☆36Oct 2, 2023Updated 2 years ago
- CVE-2023-40477 PoC by Wild-Pointer☆24Aug 30, 2023Updated 2 years ago
- A discord Remote Administration Tool. Easy to use, undetected and powerfull.☆24Mar 20, 2026Updated 3 weeks ago
- 阴阳怪气编码☆24Nov 7, 2024Updated last year
- ☆10Mar 7, 2023Updated 3 years ago
- API Client Library for is.gd and v.gd targeting .NET Standard 1.1☆13Jun 7, 2023Updated 2 years ago
- Orb is a massive footprinting tool.☆53Jan 11, 2020Updated 6 years ago