samogod / tornado
Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.
☆444Updated last month
Alternatives and similar repositories for tornado:
Users that are interested in tornado are comparing it to the libraries listed below
- AV evading OSX Backdoor and Crypter Framework☆278Updated 11 months ago
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆155Updated last year
- Arbitrium is a cross-platform, fully undetectable remote access trojan, to control Android, Windows and Linux and doesn't require any fir…☆342Updated 4 years ago
- Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products☆334Updated last year
- A Python based RAT 🐀 (Remote Access Trojan) for getting reverse shell 🖥️☆767Updated last year
- RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model,…☆278Updated 3 years ago
- Python AV Evasion Tools☆497Updated this week
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆22Updated last year
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆178Updated 2 years ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆466Updated last year
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆233Updated 3 years ago
- KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detecti…☆359Updated last year
- Tool to evade Antivirus With Different Techniques☆167Updated last year
- [WIP] A free and open-source, modular Remote Administration Tool (RAT) / Payload Dropper written in Go(lang) with a flexible command and …☆219Updated last year
- DarkComet RAT(RemoteAdministrationTool) 5.3.1☆181Updated last year
- POC Pdf-exploit builder on C#☆129Updated 10 months ago
- Decrypt gecko based browsers passwords, cookies, history, bookmarks.☆257Updated 4 years ago
- Remote persistent 🔑Logger for Windows and Linux☆299Updated last year
- Hide your payload into .jpg file☆388Updated 3 years ago
- FUD metasploit Persistence RAT☆4Updated last year
- VenomRAT-HVNC 5.6, this is the latest version with a working HVNC module !☆119Updated 2 years ago
- Remote Access Tool Written In C#☆482Updated 2 years ago
- THorse is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python 3.☆581Updated last year
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆173Updated 2 years ago
- Command & Control-Framework created for collaboration in python3☆316Updated last year
- Create a fully undetectable backdoor with simple steps.☆73Updated 2 years ago
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆380Updated 2 years ago
- Stealer written on C#, logs will be sent to Telegram bot.☆395Updated 3 years ago
- Remote Access Trojan collection.(260+ RAT-Builders!)☆210Updated 2 years ago
- Modular penetration testing platform that enables you to write, test, and execute exploit code.☆293Updated last month