AhMyth is an popular open source android rat. But the official AhMyth contains many bugs. For an example, you can't fetch victim's files from the remote server using official AhMyth. So that we have modified the rat and remove all bugs and also added some extra features.
☆23Jan 30, 2021Updated 5 years ago
Alternatives and similar repositories for AhMyth-Modified-Version
Users that are interested in AhMyth-Modified-Version are comparing it to the libraries listed below
Sorting:
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- Windows process injection methods☆18Jul 18, 2021Updated 4 years ago
- ☆27Oct 27, 2025Updated 4 months ago
- ☆12Nov 9, 2021Updated 4 years ago
- a lightweight library geared towards windows process hacking/manipulation, but with much more use case.☆32Jan 21, 2022Updated 4 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆42May 18, 2024Updated last year
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- In accordance with survey reports, the growth of online business worldwide is significantly faster and higher in comparison with traditio…☆13Jul 30, 2023Updated 2 years ago
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- Web To App - Examples of how to port a Web or HTML5 game to a native Android, iOS and Mac OS X App☆14Oct 30, 2022Updated 3 years ago
- ☆13Jun 29, 2023Updated 2 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Create Unlimited Facebook Account with Email and Number☆10Feb 24, 2021Updated 5 years ago
- PHP Application To Spoof And Send E-mail.☆10Jan 4, 2016Updated 10 years ago
- W Generator - A powerful frontend tool for penetration testers to generate customized wordlists based on public user information☆43Apr 25, 2023Updated 2 years ago
- Extended Bitcoin Clipper from Nyan Cat☆32Aug 15, 2020Updated 5 years ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Dec 15, 2023Updated 2 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- An simple crypter made with Xanthorox AI for Testing v5 pro capabilities☆39Feb 11, 2026Updated 3 weeks ago
- Build wordlists from the common-crawl index☆12Oct 9, 2022Updated 3 years ago
- a markov based rule generator for hashcat/mdxfind/jtr☆24Dec 8, 2025Updated 2 months ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- Simple KDMapper driver dumper. Unlike other dumpers, this dumper dumps the PE headers of the image too.☆17May 10, 2024Updated last year
- Cracking hashes using AWS GPU instances☆10Sep 4, 2017Updated 8 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 10 months ago
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆10Apr 29, 2025Updated 10 months ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- A Flutter price comparison app for the Indonesian online marketplace.☆17Jul 24, 2020Updated 5 years ago
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆12Dec 8, 2025Updated 2 months ago
- Linux kernel-mode and user-space with wine/MinGW/Windows compability hacking library.☆12Sep 15, 2022Updated 3 years ago
- ☆14Apr 6, 2025Updated 10 months ago
- ☆14Jul 26, 2025Updated 7 months ago
- Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to…☆13May 30, 2022Updated 3 years ago
- ☆12Apr 26, 2022Updated 3 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- Awesome Hacking and Tech. Related Tutorials☆11May 14, 2025Updated 9 months ago