Python RAT with reverse connection and asymmetric encrypted communications
☆14Jun 30, 2020Updated 5 years ago
Alternatives and similar repositories for RATAS
Users that are interested in RATAS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆17Aug 20, 2023Updated 2 years ago
- Simple but sharp ransomware☆38Jul 11, 2020Updated 5 years ago
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆77Jan 16, 2023Updated 3 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- Quantum zero-day exploit Hunting for vulnerabilities as small as a quantum particle☆13Jun 13, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Listing of my writeups from HackTheBox, VulnHub, TryHackMe, others...☆19May 26, 2021Updated 4 years ago
- Herramienta automatizada para enviar correos con phising.☆16Jul 29, 2020Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Oct 26, 2020Updated 5 years ago
- Universal LAN-based SSRF Attack Primitive☆19Aug 10, 2019Updated 6 years ago
- ☆16May 6, 2015Updated 10 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆19May 20, 2020Updated 5 years ago
- GeoIP plotting script written in Python to help security teams draw visualized reports from IP addresses☆20May 29, 2022Updated 3 years ago
- the venom framework is a framework made in ruby filled with tools for wireless hacking, normal terminal commands, metasploit payloads and…☆19Jun 6, 2019Updated 6 years ago
- Random scripts I write to automate non-hacking stuff☆23Mar 24, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- this tool can deploy malware using wifi that it can be downloaded by the user.☆13Dec 16, 2023Updated 2 years ago
- ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.☆16Nov 27, 2025Updated 5 months ago
- Internet Explorer Organization Page☆23Oct 31, 2018Updated 7 years ago
- ⛔🛡️ WeDefend - Monitor and Protect Windows from Remote Access Trojan☆25Jun 16, 2018Updated 7 years ago
- Refactoring for 51pwn online☆13Dec 9, 2022Updated 3 years ago
- SMR-Portal: an online platform for integrative analysis of GWAS and xQTL data to identify complex trait genes.☆22Dec 2, 2025Updated 5 months ago
- deface-X is an automatic deface tool used to inject a website☆13Oct 16, 2025Updated 6 months ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- Social Engineering Attack Using Phishing in a Local Area Wi-Fi by Creating an Access Point and DNS Manipulation☆13Nov 25, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- The best FUD Crypter to make your .exe Trojan fully Undetectable from all AV's and protections☆19Oct 14, 2025Updated 6 months ago
- create fully undetectable payload☆18Mar 29, 2023Updated 3 years ago
- HTTP based framework for building command and control components for remote access trojans☆15Aug 2, 2021Updated 4 years ago
- CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.☆11Jul 8, 2019Updated 6 years ago
- A PoC C2 implementation that uses Native Messaging API to execute direct commands in the OS☆17Nov 5, 2025Updated 6 months ago
- Hollywood-style CCTV hacking - PoC☆40May 30, 2020Updated 5 years ago
- Bolster NEO API - Artificial intelligence based zero-hour phishing detection☆13Aug 10, 2021Updated 4 years ago
- Tool for finding Known Vulnerability of an ip address☆13Nov 13, 2024Updated last year
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Dec 26, 2019Updated 6 years ago
- ☆14Feb 26, 2024Updated 2 years ago
- Excel parser for various pentesting tools.☆31Jun 13, 2023Updated 2 years ago
- 3D printed mini circular table saw.☆11Jul 19, 2014Updated 11 years ago
- this project is a smart sniffer made by BlackDOS team☆11Jun 14, 2017Updated 8 years ago
- bugreport☆13May 19, 2019Updated 6 years ago
- SQL Detector Tool In Go Language☆22Jan 10, 2023Updated 3 years ago