Python RAT with reverse connection and asymmetric encrypted communications
☆16Jun 30, 2020Updated 5 years ago
Alternatives and similar repositories for RATAS
Users that are interested in RATAS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago
- Simple but sharp ransomware☆35Jul 11, 2020Updated 5 years ago
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆76Jan 16, 2023Updated 3 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- Quantum zero-day exploit Hunting for vulnerabilities as small as a quantum particle☆13Jun 13, 2025Updated 9 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Listing of my writeups from HackTheBox, VulnHub, TryHackMe, others...☆20May 26, 2021Updated 4 years ago
- Herramienta automatizada para enviar correos con phising.☆16Jul 29, 2020Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Oct 26, 2020Updated 5 years ago
- Universal LAN-based SSRF Attack Primitive☆19Aug 10, 2019Updated 6 years ago
- ☆16May 6, 2015Updated 10 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆19May 20, 2020Updated 5 years ago
- SWF Vulnerability & Information Scanner☆18Nov 24, 2018Updated 7 years ago
- GeoIP plotting script written in Python to help security teams draw visualized reports from IP addresses☆20May 29, 2022Updated 3 years ago
- the venom framework is a framework made in ruby filled with tools for wireless hacking, normal terminal commands, metasploit payloads and…☆19Jun 6, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Random scripts I write to automate non-hacking stuff☆23Mar 24, 2019Updated 7 years ago
- this tool can deploy malware using wifi that it can be downloaded by the user.☆13Dec 16, 2023Updated 2 years ago
- ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.☆16Nov 27, 2025Updated 3 months ago
- Internet Explorer Organization Page☆23Oct 31, 2018Updated 7 years ago
- ⛔🛡️ WeDefend - Monitor and Protect Windows from Remote Access Trojan☆25Jun 16, 2018Updated 7 years ago
- Refactoring for 51pwn online☆13Dec 9, 2022Updated 3 years ago
- SMR-Portal: an online platform for integrative analysis of GWAS and xQTL data to identify complex trait genes.☆21Dec 2, 2025Updated 3 months ago
- deface-X is an automatic deface tool used to inject a website☆13Oct 16, 2025Updated 5 months ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Social Engineering Attack Using Phishing in a Local Area Wi-Fi by Creating an Access Point and DNS Manipulation☆13Nov 25, 2021Updated 4 years ago
- The best FUD Crypter to make your .exe Trojan fully Undetectable from all AV's and protections☆19Oct 14, 2025Updated 5 months ago
- The big-tool is for installing all hacking and security tools !☆10Jul 4, 2021Updated 4 years ago
- create fully undetectable payload☆17Mar 29, 2023Updated 2 years ago
- HTTP based framework for building command and control components for remote access trojans☆15Aug 2, 2021Updated 4 years ago
- Hollywood-style CCTV hacking - PoC☆39May 30, 2020Updated 5 years ago
- Bolster NEO API - Artificial intelligence based zero-hour phishing detection☆13Aug 10, 2021Updated 4 years ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- Tool for finding Known Vulnerability of an ip address☆13Nov 13, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Dec 26, 2019Updated 6 years ago
- ☆14Feb 26, 2024Updated 2 years ago
- 3D printed mini circular table saw.☆11Jul 19, 2014Updated 11 years ago
- this project is a smart sniffer made by BlackDOS team☆11Jun 14, 2017Updated 8 years ago
- Multithread reverse shell listener☆26Feb 10, 2024Updated 2 years ago
- Its a virus tool which destroys pc faster...☆15Sep 27, 2021Updated 4 years ago
- EXXX EVASION | Metasploit Antivirus Evasion | Fully Undetectable Payloads☆29Apr 27, 2020Updated 5 years ago