Undetectable payload for Windows 10 and 11
☆39Mar 9, 2023Updated 3 years ago
Alternatives and similar repositories for EvilRAT
Users that are interested in EvilRAT are comparing it to the libraries listed below
Sorting:
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Oct 21, 2023Updated 2 years ago
- Plunge into the depths of the web with Linkscraper! Uncover links, images, emails, and more swiftly, catering to researchers, developers,…☆11Nov 9, 2024Updated last year
- Numbers in Your Documents can reveal your personal informations. This tool is an OSINT tool to gather informations from CC, BIN code, MIC…☆13Jan 31, 2021Updated 5 years ago
- Locate device location using Social engineering☆18Sep 30, 2022Updated 3 years ago
- CDPwn is a python script designed to capture screenshots of files via the Chrome DevTools Protocol (CDP), a technique useful for privileg…☆14May 23, 2024Updated last year
- NoSecerets is a python script that is designed to crack hashes extremely fast. Faster even than Hashcat☆11Mar 13, 2022Updated 3 years ago
- Really useful hacking tools.☆19Dec 16, 2023Updated 2 years ago
- Stealer written on C#, logs will be sent to Discord Webhook.☆26Jan 27, 2022Updated 4 years ago
- hack tik tok☆20May 19, 2021Updated 4 years ago
- this FUD Payload☆39Jul 28, 2021Updated 4 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- Bypass http 403 🐏☆16Feb 26, 2022Updated 4 years ago
- Exploits written while preparing for the OSED exam☆25Apr 30, 2024Updated last year
- Network/host scanner and information gatherer☆25Oct 21, 2023Updated 2 years ago
- ☆27Jul 5, 2023Updated 2 years ago
- 「🚪」Linux Backdoor based on ICMP protocol☆63Dec 7, 2024Updated last year
- Network sniffing automation with Bettercap as rogue AP or as client in your network☆25May 30, 2022Updated 3 years ago
- Programa simple hecho en python que destruye tokens de discord.☆11Feb 25, 2023Updated 3 years ago
- Automatically clone websites and patch them with PHP to create phishing pages☆58May 29, 2025Updated 9 months ago
- The "Mailer" tool is a Python script for conducting simulated cyber attacks, including phishing attacks on social media platforms like Fa…☆66Apr 23, 2025Updated 10 months ago
- Hacker Community Remote Access Trojan☆27Mar 3, 2022Updated 4 years ago
- CVE-2022-21907 Vulnerability PoC☆30Jan 23, 2022Updated 4 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆116Jul 18, 2023Updated 2 years ago
- Open Source XSS exploitation tool. using http proxy to access the browser which executed js. [Engineering Experimental]☆36Nov 22, 2024Updated last year
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆316Nov 29, 2025Updated 3 months ago
- Updated version of the ProtoBurp Extension, with enhanced features and capabilities to encode and fuzz custom protobuf messages☆36Sep 11, 2023Updated 2 years ago
- This is an IP Puller for the game VRChat join discord for updates and support☆18Feb 16, 2026Updated 2 weeks ago
- ip-keyloger☆10Jan 9, 2026Updated last month
- PHP email spoofer | Send emails from any email adress☆82Apr 26, 2020Updated 5 years ago
- Evildork targeting your fiancee👁️☆92Jul 30, 2023Updated 2 years ago
- CVE-2022-1388 F5 BIG-IP iControl REST RCE☆37May 9, 2022Updated 3 years ago
- Disable Windows Defender All Version☆31Jan 5, 2021Updated 5 years ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆100Oct 27, 2024Updated last year
- Smishing Botnets Going Viral in Iran☆10Feb 19, 2022Updated 4 years ago
- A C2 framework inspired by anime, made in python.☆12Feb 8, 2026Updated last month
- Cloud SQL Proxy works with encrypted credential file.☆10Jan 27, 2021Updated 5 years ago
- Exploiting Android devices☆10Sep 12, 2022Updated 3 years ago
- ☆10Apr 18, 2019Updated 6 years ago