Fairly Undetectable Linux Spyware
☆18Mar 1, 2023Updated 3 years ago
Alternatives and similar repositories for Raven
Users that are interested in Raven are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An unfinished project. HTTP botnet coded in VB.net and PHP.☆16Aug 17, 2015Updated 10 years ago
- Quantum zero-day exploit Hunting for vulnerabilities as small as a quantum particle☆13Jun 13, 2025Updated 9 months ago
- A penetration testing tool to help in Infrastructure pentesting process.☆11Sep 19, 2023Updated 2 years ago
- ☆16Nov 11, 2022Updated 3 years ago
- ☆16May 6, 2015Updated 10 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago
- Ray-casting game for wasting productive time.☆11May 23, 2021Updated 4 years ago
- A command-line tool for testing RocketMQ vulnerabilities.☆13Feb 7, 2025Updated last year
- it's a small program written in rust with only the standard library to analyze the headers of an elf64 file☆14May 23, 2024Updated last year
- this is a small pe64 file analyzer in c++ with winapi, I didn't do it in the best way but hey, it's a small project like that that I tho…☆15Jan 1, 2025Updated last year
- it's a cli debugger written in rust, it allows the placement of breakpoints, modifying elements at addresses, modifying the value of regi…☆16Dec 14, 2024Updated last year
- An efficient spyware that is barely undetectable by antiviruses and get execute every time the computer start.☆22Apr 18, 2024Updated last year
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- SMR-Portal: an online platform for integrative analysis of GWAS and xQTL data to identify complex trait genes.☆21Dec 2, 2025Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Go Ransomware (YouTube)☆22Nov 17, 2022Updated 3 years ago
- this is a translator of assembly to C language written in rust, THE PROJECT IS UNDER DEVELOPMENT!!☆17Jun 12, 2024Updated last year
- Trojan Rat Builder(348), Ransomware Builder(17), Crypter(110), Miner(9), Worm(8), Botnet(49), Virus Builder(62), Binder(35), Exploit(42),…☆21Mar 29, 2022Updated 3 years ago
- Bolster NEO API - Artificial intelligence based zero-hour phishing detection☆13Aug 10, 2021Updated 4 years ago
- Tool for finding Known Vulnerability of an ip address☆13Nov 13, 2024Updated last year
- Hacking Tricks, Techniques & Tools☆16Sep 18, 2020Updated 5 years ago
- It is a advanced keylogger.☆77Jul 2, 2024Updated last year
- SQL Detector Tool In Go Language☆22Jan 10, 2023Updated 3 years ago
- ☆12Jan 28, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin <= 5.7.14 - Unauthenticated SQL Injection☆20Sep 15, 2024Updated last year
- Simulate device shutdown, ideal for use with anti-theft apps.☆20Dec 29, 2025Updated 2 months ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Feb 1, 2023Updated 3 years ago
- Yandex browser passwords and credit-cards decryption algorithm☆23Apr 8, 2025Updated 11 months ago
- Lists of hacking: Blog, Forums, Telegram channel and all kind of resources in spanish and english.☆15Mar 7, 2021Updated 5 years ago
- A really good cybersec reading materials.☆13Aug 13, 2022Updated 3 years ago
- auto-ropper☆17Jul 7, 2022Updated 3 years ago
- A terminal plugin to make Kali Linux objectively better - compatible with ohmyzsh☆18Jan 23, 2024Updated 2 years ago
- FUD Linux Remote Access Trojan☆18Nov 18, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Boilerplate to Setup Authentication using Django-all auth 🚀☆14Aug 30, 2021Updated 4 years ago
- A python trojan with spyware, info stealing and ransomware abilities.☆34Sep 12, 2025Updated 6 months ago
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆20May 19, 2023Updated 2 years ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 3 years ago
- reverse shell + keylogger + wifis password stealing + screen sharing + camera sharing☆29Jan 13, 2021Updated 5 years ago
- ☆12Mar 3, 2026Updated 3 weeks ago
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆25Jan 29, 2024Updated 2 years ago