👾 WHT allow you to disable Windows Defender, Windows Firewall, clear all logs and reverse (Enable Firewall, enable Defender)
☆24Aug 27, 2019Updated 6 years ago
Alternatives and similar repositories for WindowsHackerToolkit
Users that are interested in WindowsHackerToolkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ⌨ A keyLogger that sends logs by email, FTP, and ICMP (ping)☆15Jan 21, 2020Updated 6 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆13Aug 31, 2019Updated 6 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆20Aug 6, 2018Updated 7 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Escalation Servers and Scripts for Priv Escalation☆18Jul 20, 2019Updated 6 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Dec 18, 2022Updated 3 years ago
- Decrypt and recover data (passwords, cookies, history, credit card) from navigator (chrome, firefox, IE, ...), wifi, windows systems, ...☆20Jul 12, 2019Updated 6 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- Easy to understand back door written in python☆36May 31, 2022Updated 3 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- ☆26Sep 2, 2025Updated 7 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ASLR Evasion, Egghunters, SEH Overwrites☆29Mar 6, 2021Updated 5 years ago
- ☆15Apr 6, 2025Updated last year
- .NET 4.5 Remote Access Tool (RAT) implementation with Telegram's API as server☆11Jul 29, 2022Updated 3 years ago
- XXE Injection Payloads☆28Jul 30, 2019Updated 6 years ago
- Burp suite Certificate modification tool☆18Apr 23, 2023Updated 2 years ago
- Remote Desktop Using Java and Robot Library☆10Jun 6, 2022Updated 3 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆31Sep 30, 2019Updated 6 years ago
- Stargate simulator with DHD and Whormhole☆12May 22, 2019Updated 6 years ago
- A Python backdoor for spying on Windows machines☆10Apr 21, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Simple but sharp ransomware☆35Jul 11, 2020Updated 5 years ago
- Multifunctional keylogger using WinAPI and libcurl☆16Sep 9, 2021Updated 4 years ago
- An advance keylogger that works and also logs special keys.☆16May 27, 2022Updated 3 years ago
- Simple netcat-like binary for Windows, created with python and py2exe.☆13Feb 1, 2019Updated 7 years ago
- Source code of Claw Key logger previously sold on HackForums☆57Aug 6, 2022Updated 3 years ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- An0n 3xPloiTeR Shell☆35Oct 4, 2019Updated 6 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆20Jun 28, 2022Updated 3 years ago
- I created the python script to bypass UAC to get system shell .☆121Sep 2, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Simple keylogger on C++ with several functions.☆16Jun 19, 2020Updated 5 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆22May 15, 2022Updated 3 years ago
- The C++ open source remote keylogger, hack windows and control mouse and keyboard remotely and bypass any antivirus☆19Apr 8, 2022Updated 4 years ago
- Control Raspberry Pi from browser☆19Nov 2, 2014Updated 11 years ago
- ☆11Jan 2, 2024Updated 2 years ago
- TCP/HTTP packet sniffer in Go☆14Jul 11, 2025Updated 9 months ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago