A very simple modify for RAT Njrat 0.7D
☆16Nov 4, 2017Updated 8 years ago
Alternatives and similar repositories for RAT-NjRat-0.7d-modded-source-code
Users that are interested in RAT-NjRat-0.7d-modded-source-code are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- fork from https://github.com/AliBawazeEer/RAT-NjRat-0.7d-modded-source-code☆25Jun 19, 2018Updated 7 years ago
- njRAT SRC Extract☆295Dec 24, 2016Updated 9 years ago
- ☆10Jun 15, 2024Updated last year
- 漏洞利用,Vmware vCenter 6.5-7.0 RCE(CVE-2021-21972),上传冰蝎3,getshell☆13Mar 1, 2021Updated 5 years ago
- ☆12Oct 29, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Dec 25, 2021Updated 4 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- 通过RPC创建计划任务☆31May 18, 2025Updated 10 months ago
- ☆21Feb 23, 2022Updated 4 years ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻☆12Nov 8, 2022Updated 3 years ago
- This tool is for "educational" purpose only, and I am not responsible for any damage caused by it in any way!☆12May 2, 2023Updated 2 years ago
- vc6.0集成番茄插件☆16Jun 26, 2020Updated 5 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- PoC Hacking Tool Contains so many stuff like hash cracking, Crypter, Ransomware Builder, etc...☆16Aug 27, 2021Updated 4 years ago
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- This is a simple program that allows you to bruteforce a protected web page where the authentication type is Basic Authentication☆11Dec 8, 2022Updated 3 years ago
- AspXVenom automates the process of generating encoded shellcode and embedding it into ASPX webshells, providing a smooth workflow for pen…☆18Mar 19, 2025Updated last year
- BitRat 1.39 Cracked & Offline Builder☆11Mar 5, 2022Updated 4 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆16Dec 21, 2021Updated 4 years ago
- Change the entry point of Windows PE file and inject a dynamic library, in order to crack software of fix games.☆10Jun 11, 2021Updated 4 years ago
- Try dictionary words as private keys to find unused funds☆11Dec 6, 2017Updated 8 years ago
- Arduino sketch to program a Malduino bad USB (lite) to download a password grabber and send the results via email☆54Jul 14, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 3 years ago
- A mirror of the PuTTY codebase with additions to psftp.exe and plink.exe☆16Jul 27, 2022Updated 3 years ago
- Let's you use any Windscribe server over a HTTP proxy. Uses Docker so multiple HTTP proxies at different locations can be created on the …☆12Jan 4, 2019Updated 7 years ago
- 通过人脸识别定位身份证获取身份证号☆18Feb 22, 2018Updated 8 years ago
- This is a repository for storing all of the scripts, documentation, binaries, etc. required to setup a Samsung Galaxy Note 10.1 2014 Edit…☆11Oct 17, 2020Updated 5 years ago
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- terminal customization☆10Dec 17, 2022Updated 3 years ago
- C++ stealer (passwords, cookies, forms, cards, wallets)☆12Dec 6, 2022Updated 3 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a firewall-evading backdoor, and reroutin…☆10Dec 23, 2014Updated 11 years ago
- Metasploit RPC controller application☆11Aug 20, 2018Updated 7 years ago
- Good guy in the middle - transparent HTTPS redirection☆17Mar 1, 2019Updated 7 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 8 years ago
- ☆16May 15, 2020Updated 5 years ago
- A simple tool to inject shellcode into an ELF binary.☆16Mar 23, 2021Updated 5 years ago
- TR069 server for QuecPython☆23Apr 30, 2025Updated 10 months ago