python remote access trojan
☆39Feb 8, 2017Updated 9 years ago
Alternatives and similar repositories for basicRAT
Users that are interested in basicRAT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- "Whatsapp Discover" is a tool for getting phone numbers of devices using Whatsapp by real time sniffing from an interface (disabled in th…☆22Mar 17, 2014Updated 12 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Dec 2, 2024Updated last year
- NetScan is a Network Reconnaissance Tool for Windows/Linux/OSx etc Written in Python 3.☆22Jan 10, 2021Updated 5 years ago
- website admin panel finder☆34Dec 29, 2020Updated 5 years ago
- Python Remote Administration Tool (RAT)☆3,573Jan 4, 2024Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Tool for viewing Android package details, including permissions, services, activities, and more.☆22Nov 30, 2012Updated 13 years ago
- Make a bad usb out of any USB drive☆21Nov 9, 2018Updated 7 years ago
- RfCat - swiss-army knife of ISM band radio☆25Feb 9, 2022Updated 4 years ago
- Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Duck…☆28Apr 15, 2017Updated 8 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆94Feb 24, 2019Updated 7 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆24May 8, 2018Updated 7 years ago
- Open-source Exploiting Framework☆32Mar 13, 2017Updated 9 years ago
- Security Advisories and Researches☆15Aug 19, 2014Updated 11 years ago
- ☆11Aug 11, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Jan 25, 2021Updated 5 years ago
- Simple script to bulk check if IPs match networks☆11Jan 11, 2022Updated 4 years ago
- Metasploit/MSFVenom Payload Generator Stand Alone☆32May 5, 2017Updated 8 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆28Aug 4, 2017Updated 8 years ago
- Remote Windows shell☆31Jun 22, 2014Updated 11 years ago
- Purpose-built Red Team network hardware implant made from common components.☆28Mar 18, 2023Updated 3 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Apr 13, 2015Updated 10 years ago
- boilerplate python rat☆114Oct 1, 2020Updated 5 years ago
- NetHunter Devices - Added support for hammerhead on Android 7+☆32Oct 2, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Kumpulan Tools Spammers (SMS,Call,Wa).☆57Apr 2, 2021Updated 5 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆12Dec 17, 2021Updated 4 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Aug 4, 2023Updated 2 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆28Dec 3, 2020Updated 5 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- Make online accounts hackproof by using encrypted passwords.☆12Oct 9, 2021Updated 4 years ago
- ☆10Mar 22, 2019Updated 7 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- SkyRAT - Powershell Remote Administration Tool☆34Jan 8, 2018Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Metasploit Framework☆10Apr 3, 2017Updated 9 years ago
- ☆12Mar 10, 2026Updated 3 weeks ago
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆19May 20, 2020Updated 5 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- pentest toolbox☆27Jul 24, 2022Updated 3 years ago
- Shellcode异或加密工具☆12Mar 23, 2017Updated 9 years ago