Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.
☆38Oct 23, 2024Updated last year
Alternatives and similar repositories for SkyRat
Users that are interested in SkyRat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Free Advance encryptor for Anon Cloud☆16Jan 26, 2023Updated 3 years ago
- ☆10Apr 27, 2025Updated 10 months ago
- Just another useless C2 occupying space in some HDD somewhere.☆21Jul 4, 2023Updated 2 years ago
- A manual PE mapping implementation, aka reflective loader☆21Feb 28, 2026Updated 3 weeks ago
- mift - a mobile image forensic toolkit☆47Nov 14, 2023Updated 2 years ago
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 9 months ago
- Collection of red team techniques.☆69Apr 25, 2025Updated 10 months ago
- PhantomsGate: Advanced Shellcode Injection Technique☆27Jul 15, 2024Updated last year
- Simple Malware Scanner written in python☆90May 10, 2025Updated 10 months ago
- A Basic Java Application Vulnerable to the Log4Shell RCE☆42Aug 1, 2023Updated 2 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- Nemo - An offensive Remote Access Tool & Post-Exploitation Framework (WIP).☆14Apr 25, 2023Updated 2 years ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- Header only library for obfuscation import winapi functions.☆43Feb 12, 2025Updated last year
- A small wifi penetration testing tool-kit☆11Jul 21, 2023Updated 2 years ago
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- Pre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️☆26Jul 22, 2022Updated 3 years ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆16Jan 7, 2023Updated 3 years ago
- Some of my custom "tools".☆28Feb 21, 2022Updated 4 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Dec 6, 2023Updated 2 years ago
- Windows Privilege Escalation Tool☆19Dec 30, 2025Updated 2 months ago
- My personal shellcode loader☆32Mar 9, 2023Updated 3 years ago
- ☆10Feb 20, 2026Updated last month
- Cookie - Phishing - Altri strumenti utili - Rendersi Anonimi nel WEB - Messaggistica Sicura☆22Apr 18, 2025Updated 11 months ago
- Pinger is a tool to ping the ip addresses in files such as excel or csv to show if the hosts are turned on.☆12Feb 9, 2020Updated 6 years ago
- EDR/AV Simulation for Malware Development☆13Oct 21, 2023Updated 2 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆54Jun 12, 2021Updated 4 years ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 10 months ago
- Python'un scapy modülü kullanılarak aynı ağda bulunan cihazların ip ve mac adreslerini listeyen script.☆11Jun 24, 2020Updated 5 years ago
- delosNmap | Nmap Script☆38Jan 15, 2023Updated 3 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated last month
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Oct 30, 2022Updated 3 years ago
- GitHub star history graph☆12Jan 29, 2026Updated last month
- A script to automate the creation of cloud infrastructure for hash cracking.☆15Sep 4, 2019Updated 6 years ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆43May 6, 2023Updated 2 years ago