EvilDroid+TheFatRat
☆15Oct 18, 2018Updated 7 years ago
Alternatives and similar repositories for devil-rat
Users that are interested in devil-rat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Jul 13, 2020Updated 5 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆20Apr 18, 2020Updated 5 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Nov 18, 2018Updated 7 years ago
- Scripts and tool for iOS app reversing☆27Oct 1, 2021Updated 4 years ago
- Hide your tcp connection!!!☆12Apr 8, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Fast iOS executable dumper☆29Jun 25, 2014Updated 11 years ago
- The Choice TheChoice is a collection of 14 hacker tools from @thelinuxchoice Installation : $ apt update && apt upgrade $ apt install git…☆17Dec 31, 2020Updated 5 years ago
- Script for encrypting a GNU/Linux filesystem and then destroying the keys☆12Sep 23, 2018Updated 7 years ago
- A collection of malicious tools I wrote when playing black team for an invitational CCDC competition☆23Mar 12, 2015Updated 11 years ago
- A tool to uncover hidden SSIDs☆13Apr 17, 2019Updated 6 years ago
- Process hide tool based on Frost driver☆16Dec 5, 2018Updated 7 years ago
- Face is most commonly used biometric to recognize people. Face recognition has received substantial attention from researchers due to hum…☆14Aug 16, 2020Updated 5 years ago
- RTL8814AU drivers with monitor mode, frame injection and AP+Jammer☆14Apr 10, 2020Updated 6 years ago
- Tool to extract & validate google fcm server keys from apks☆30Jan 20, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Multi-Tooled Phishing Framework. TigerShark intergrates some of the best (in my opinion), phishing tools and frameworks of various langua…☆13Jun 19, 2020Updated 5 years ago
- A little python script to uncovering hidden SSIDs.☆11Oct 29, 2017Updated 8 years ago
- An elite hacking tool to crack into the email accounts of your victims☆19Jun 11, 2016Updated 9 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- Windows shellcode encoding and encrypting tool☆20May 4, 2022Updated 3 years ago
- A tool to automatically verify Apple ID's☆22Oct 29, 2018Updated 7 years ago
- Social engineering credential harvester☆17Oct 4, 2021Updated 4 years ago
- Generator for fake ID barcodes. (Currently SC only, looking to expand).☆33Jan 5, 2015Updated 11 years ago
- A Android program help you learn English.☆14Mar 18, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This is a simple web application vulnerability scanner that checks if a given URL or IP address is vulnerable to 36 common web applicatio…☆26Dec 7, 2025Updated 4 months ago
- Makes files super hidden on NTFS☆19Aug 14, 2014Updated 11 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- Nmap results are a semigroup☆13Jul 8, 2021Updated 4 years ago
- Non-Alphanumeric JS Obfuscator☆14Aug 22, 2016Updated 9 years ago
- FBI a info gathering tool, very useful for picking... Well... git clone and you'll see ;D☆35Apr 15, 2019Updated 6 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆14Jan 24, 2021Updated 5 years ago
- ☆11Jun 22, 2020Updated 5 years ago
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆14May 11, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- autoscan - automatic fingerprint of visited networks☆11Nov 2, 2013Updated 12 years ago
- CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader "d…☆16Dec 22, 2023Updated 2 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- ☆12Nov 9, 2021Updated 4 years ago
- aircrack-ng gui 2019☆20Oct 30, 2018Updated 7 years ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- PHP Vulnerability Hunter (fork)☆12May 8, 2015Updated 10 years ago