nathanlopez / basicRAT
python remote access trojan
☆32Updated 7 years ago
Alternatives and similar repositories for basicRAT:
Users that are interested in basicRAT are comparing it to the libraries listed below
- Metasploit/MSFVenom Payload Generator Stand Alone☆31Updated 7 years ago
- Vault 7: CIA Hacking Tools Revealed☆15Updated 7 years ago
- Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Duck…☆26Updated 7 years ago
- Hack Cameras CCTV FREE☆16Updated 3 years ago
- Package manager for hackers built by hackers☆35Updated 6 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆21Updated 4 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆15Updated 4 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆28Updated 6 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆51Updated 7 years ago
- pen testing scripts☆9Updated 3 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 8 years ago
- NOGO is a packaging script that creates fully undetectable payloads specializing in disabling anti-virus. Created for pentesting (crippli…☆14Updated 5 years ago
- ☆19Updated 7 years ago
- PHP Script intdended to be used during Phishing campaigns as a credentials collector linked to backdoored HTML <form> action parameter☆58Updated 3 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆36Updated 5 years ago
- Payload delivery via URL and some social engineering.☆17Updated 6 months ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆51Updated 4 years ago
- Repository of tools used in my blog☆50Updated 10 months ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆31Updated 7 years ago
- Note:- Run this Script in root user.☆16Updated 7 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Keylogger for ethical hackers☆14Updated 3 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆23Updated 6 years ago
- Python Backdoor Obfusctor, Encrypter and Encoder☆14Updated 6 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆32Updated 8 years ago
- Automation Hacking & Penetration Testing Suite☆10Updated 8 years ago
- All Zero Day Exploits☆19Updated 7 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆32Updated 4 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆22Updated 6 years ago