nathanlopez / StitchLinks
Python Remote Administration Tool (RAT)
☆3,469Updated last year
Alternatives and similar repositories for Stitch
Users that are interested in Stitch are comparing it to the libraries listed below
Sorting:
- Python botnet and backdoor☆1,599Updated 2 years ago
- Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor a…☆1,161Updated 3 years ago
- Generate Gmail Emailing Keyloggers to Windows.☆1,114Updated 2 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,376Updated 4 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,886Updated last year
- Efficient and advanced man in the middle framework☆2,144Updated 2 years ago
- RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware☆1,003Updated 4 years ago
- LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)☆1,115Updated 6 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,430Updated 7 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆10,776Updated last year
- Windows Remote-Access-Trojan☆694Updated 8 years ago
- Undetectable Windows Payload Generation☆1,606Updated 3 years ago
- An Python Script For Generating Payloads that Bypasses All Antivirus so far .☆989Updated last year
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆2,311Updated 3 years ago
- This project is a cross-platform backdoor/reverse shell and post-exploitation tool written in Python3☆758Updated last year
- hack tools☆1,156Updated last year
- venom - C2 shellcode generator/compiler/handler☆1,917Updated last year
- Phishing Campaign Toolkit☆2,481Updated 4 months ago
- Automatically brute force all services running on a target.☆2,157Updated last year
- Keylogger is 100% invisible keylogger not only for users, but also undetectable by antivirus software. keylogger Monitors all keystokes, …☆939Updated 3 months ago
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆929Updated 6 months ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,216Updated 5 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,140Updated 5 years ago
- Remote Access Tool☆613Updated 2 years ago
- Python Remote Administration Tool (RAT) to gain meterpreter session☆633Updated last year
- Websploit is a high level MITM framework☆1,218Updated 2 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆1,491Updated 3 months ago
- Android Remote Administration Tool☆4,983Updated 4 years ago
- A Stealthy Trojan Spyware☆1,124Updated last month
- Veil 3.1.X (Check version info in Veil at runtime)☆4,174Updated 2 years ago