EvilDroid+TheFatRat
☆14Oct 18, 2018Updated 7 years ago
Alternatives and similar repositories for devil-rat
Users that are interested in devil-rat are comparing it to the libraries listed below
Sorting:
- ☆13Jul 13, 2020Updated 5 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Nov 18, 2018Updated 7 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆20Apr 18, 2020Updated 5 years ago
- Scripts and tool for iOS app reversing☆27Oct 1, 2021Updated 4 years ago
- ☆10Aug 9, 2024Updated last year
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Feb 7, 2026Updated 3 weeks ago
- Module to use a Minecraft Server through Metasploit☆10Oct 19, 2013Updated 12 years ago
- A Android program help you learn English.☆13Mar 18, 2024Updated last year
- Non-Alphanumeric JS Obfuscator☆14Aug 22, 2016Updated 9 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- This python script can help you to detect what object is in moving.☆12Nov 28, 2018Updated 7 years ago
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- In photographic media, faces are often obfuscated to protect the identity of those pictured. This obfuscation process is done by removing…☆12Jan 10, 2019Updated 7 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- AUR Driver with monitor mode and frame injection for the trl8814au wifi chip☆10Nov 21, 2019Updated 6 years ago
- A little python script to uncovering hidden SSIDs.☆11Oct 29, 2017Updated 8 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- ☆11Jun 22, 2020Updated 5 years ago
- Metasploit RPC controller application☆11Aug 20, 2018Updated 7 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- APK Static Analyzer☆10Dec 4, 2015Updated 10 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- The implementation of sdhash, the algorithm to calculate similarity digests, rewritten in pure go language 🐹☆10Jan 17, 2021Updated 5 years ago
- An OSINT tool to find data leaks on a targeted website☆17Mar 30, 2021Updated 4 years ago
- Nmap results are a semigroup☆13Jul 8, 2021Updated 4 years ago
- A tool to uncover hidden SSIDs☆13Apr 17, 2019Updated 6 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Mar 2, 2021Updated 5 years ago
- This is a script that accesses subreddits and downloads media based on keywords from the submission title.☆13Mar 9, 2020Updated 5 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- Bruteforce logins with python☆11Jul 12, 2022Updated 3 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- autoscan - automatic fingerprint of visited networks☆11Nov 2, 2013Updated 12 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- ☆11Mar 2, 2019Updated 7 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- Tools and scripts dedicated to Android application security☆52Mar 3, 2021Updated 4 years ago