πΎ WHT allow you to disable Windows Defender, Windows Firewall, clear all logs and reverse (Enable Firewall, enable Defender)
β24Aug 27, 2019Updated 6 years ago
Alternatives and similar repositories for WindowsHackerToolkit
Users that are interested in WindowsHackerToolkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- RDP EXPLOΔ°Tβ13Oct 28, 2019Updated 6 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommendedβ12Aug 31, 2019Updated 6 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.β20Aug 6, 2018Updated 7 years ago
- β13Oct 14, 2017Updated 8 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.β12Sep 22, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.β26Oct 13, 2019Updated 6 years ago
- Post-Exploitation module for Penetration Tester and Hackers.β27Dec 29, 2021Updated 4 years ago
- Escalation Servers and Scripts for Priv Escalationβ18Jul 20, 2019Updated 6 years ago
- this is the youtube phishing html, use it to grab anyones google account info ! Link : https://pinkythegawd.github.io/youtube-phishing-paβ¦β18Oct 10, 2025Updated 5 months ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.β14Dec 13, 2023Updated 2 years ago
- Easy to understand back door written in pythonβ36May 31, 2022Updated 3 years ago
- Automated NoSQL database enumeration and web application exploitation tool.β25May 6, 2019Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwritesβ29Mar 6, 2021Updated 5 years ago
- β14Apr 6, 2025Updated 11 months ago
- End-to-end encrypted email - Proton Mail β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- β14Feb 10, 2020Updated 6 years ago
- .NET 4.5 Remote Access Tool (RAT) implementation with Telegram's API as serverβ11Jul 29, 2022Updated 3 years ago
- C++ implementation of DOUBLEPULSAR usermode shellcode. Yet another Reflective DLL loader.β31Nov 9, 2021Updated 4 years ago
- MDPin is a server and a website. It contains an UI to fake a Android login screen to steal their pin code. It works via a web browser, byβ¦β43Mar 9, 2021Updated 5 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authenticaβ¦β31Sep 30, 2019Updated 6 years ago
- the assembly shell and backdoor Trojanβ18Dec 19, 2021Updated 4 years ago
- Stargate simulator with DHD and Whormholeβ12May 22, 2019Updated 6 years ago
- SharpCat - A Simple Reversed Command Shell which can be started using InstallUtil (Bypassing AppLocker)β47Jun 10, 2016Updated 9 years ago
- A Python backdoor for spying on Windows machinesβ10Apr 21, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Simple but sharp ransomwareβ35Jul 11, 2020Updated 5 years ago
- JTAG ICE mkI adapter clone for Atmel AVR MCUsβ18Aug 10, 2012Updated 13 years ago
- Multifunctional keylogger using WinAPI and libcurlβ16Sep 9, 2021Updated 4 years ago
- An advance keylogger that works and also logs special keys.β16May 27, 2022Updated 3 years ago
- Simple netcat-like binary for Windows, created with python and py2exe.β13Feb 1, 2019Updated 7 years ago
- Source code of Claw Key logger previously sold on HackForumsβ57Aug 6, 2022Updated 3 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)β20Jun 28, 2022Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeβ¦β22May 15, 2022Updated 3 years ago
- An open source PS4 Remote Play client, based on reverse engineered protocol documentationβ12Jul 22, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's reβ¦β22Aug 4, 2020Updated 5 years ago
- Some of my public E2 chips / libraries for garrysmod. For my Lua and SF Creations: https://github.com/Vurv78/luaβ14Jul 13, 2023Updated 2 years ago
- Useful info for working with AVR JTAG ICE Version 2.0 (clone), found in the Chinese markets.β12Sep 30, 2021Updated 4 years ago
- β11Jan 2, 2024Updated 2 years ago
- rce exploit , made to work with pocsuite3β122Aug 19, 2019Updated 6 years ago
- An opensource keyboard managerβ19Oct 14, 2015Updated 10 years ago
- CyberScanβ26Feb 21, 2018Updated 8 years ago