Undetectable payload for Windows 10 and 11
☆40Mar 9, 2023Updated 3 years ago
Alternatives and similar repositories for EvilRAT
Users that are interested in EvilRAT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Oct 21, 2023Updated 2 years ago
- GENERATE PYTHON BASED FUD STUB☆20Nov 20, 2023Updated 2 years ago
- This is an IP Puller for the game VRChat join discord for updates and support☆18Feb 16, 2026Updated 2 months ago
- CVE-2022-1388 F5 BIG-IP iControl REST RCE☆37May 9, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Agent301 automation scripts that uses no API. Special thanks to @vonssy☆11Nov 9, 2024Updated last year
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 14, 2018Updated 7 years ago
- ☆10Dec 16, 2024Updated last year
- Plunge into the depths of the web with Linkscraper! Uncover links, images, emails, and more swiftly, catering to researchers, developers,…☆11Nov 9, 2024Updated last year
- Dash rootkit. Linux Trojan Backdoor. (MALWARE)☆12Apr 3, 2023Updated 3 years ago
- CDPwn is a python script designed to capture screenshots of files via the Chrome DevTools Protocol (CDP), a technique useful for privileg…☆14May 23, 2024Updated last year
- Reverse shell using Windows Registry files (.reg)☆18Apr 7, 2020Updated 6 years ago
- NoSecerets is a python script that is designed to crack hashes extremely fast. Faster even than Hashcat☆11Mar 13, 2022Updated 4 years ago
- Proof of concept for the command injection vulnerability affecting the ZTE MF286R router, including an RCE exploit.☆11Jan 7, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A simple unofficial Python3 library to interface with elevenlabs.io.☆17Nov 12, 2023Updated 2 years ago
- RUSTENGINE is the high-assurance HTTP server.☆11Aug 11, 2021Updated 4 years ago
- ☆29Jul 5, 2023Updated 2 years ago
- The official HackerGPT repository☆23Jan 13, 2024Updated 2 years ago
- ☆20Jul 23, 2023Updated 2 years ago
- this FUD Payload☆38Jul 28, 2021Updated 4 years ago
- Exploits written while preparing for the OSED exam☆24Apr 30, 2024Updated last year
- Simple keylogger written in C# which is ready for modifications.☆14Jul 29, 2021Updated 4 years ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Loads .NET Assembly Via CLR Loader☆17Mar 6, 2019Updated 7 years ago
- Wardriving tool for finding Flock Cameras.☆36Mar 27, 2026Updated 3 weeks ago
- An install helper program for items served via OpenCollaborationServices (ocs://)☆15Jun 23, 2017Updated 8 years ago
- Automated credential stealer for the USB Rubber Ducky.☆10Feb 13, 2022Updated 4 years ago
- POC about how to prevent windbg break☆15Oct 3, 2022Updated 3 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Sep 27, 2016Updated 9 years ago
- ☆10Jan 9, 2026Updated 3 months ago
- ☆14Feb 9, 2020Updated 6 years ago
- Really useful hacking tools.☆19Dec 16, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Locate device location using Social engineering☆18Sep 30, 2022Updated 3 years ago
- Sms spoof☆10Feb 19, 2026Updated 2 months ago
- - Anonymous E-Mail sending. - E-Mail bombing without logging in. - Sms bombing by victim no.☆10Oct 21, 2023Updated 2 years ago
- Nirsoft Package to create an powerful usb sniffer in background☆14Mar 9, 2015Updated 11 years ago
- IoT device scanner with CVE database and many features.☆14Mar 8, 2026Updated last month
- Python3 Scripts for OSCP buffer overflow exploitation☆12May 12, 2021Updated 4 years ago
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆40Nov 28, 2023Updated 2 years ago