screetsec / TheFatRatView external linksLinks
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
☆11,029Mar 17, 2024Updated last year
Alternatives and similar repositories for TheFatRat
Users that are interested in TheFatRat are comparing it to the libraries listed below
Sorting:
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,940Mar 22, 2024Updated last year
- Python Remote Administration Tool (RAT)☆3,525Jan 4, 2024Updated 2 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,198Oct 9, 2023Updated 2 years ago
- Attack Surface Management Platform☆9,386Jan 12, 2026Updated last month
- Android Remote Administration Tool☆5,063Aug 12, 2021Updated 4 years ago
- Remote Administration Tool for Windows☆9,719Feb 29, 2024Updated last year
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,899Jan 24, 2024Updated 2 years ago
- venom - C2 shellcode generator/compiler/handler☆1,932Dec 9, 2023Updated 2 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,437Nov 3, 2018Updated 7 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,806Jan 19, 2020Updated 6 years ago
- Undetectable Windows Payload Generation☆1,608Nov 8, 2022Updated 3 years ago
- A swiss army knife for pentesting networks☆9,056Dec 6, 2023Updated 2 years ago
- Exploitation Framework for Embedded Devices☆12,968Jun 10, 2025Updated 8 months ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,274Nov 1, 2025Updated 3 months ago
- MSFvenom Payload Creator (MSFPC)☆1,312May 9, 2021Updated 4 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,750Apr 25, 2024Updated last year
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,389Feb 10, 2021Updated 5 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,115Sep 29, 2025Updated 4 months ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆2,337Sep 12, 2022Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,865Aug 17, 2020Updated 5 years ago
- AntiVirus Evasion Tool☆1,740Apr 23, 2025Updated 9 months ago
- Python antivirus evasion tool☆1,445Oct 21, 2023Updated 2 years ago
- The Rogue Access Point Framework☆14,435Feb 4, 2025Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆75,135Feb 2, 2026Updated 2 weeks ago
- Credentials recovery project☆10,659Sep 18, 2025Updated 5 months ago
- Official Black Hat Arsenal Security Tools Repository☆4,223Aug 26, 2024Updated last year
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,318Jan 23, 2018Updated 8 years ago
- Automated All-in-One OS Command Injection Exploitation Tool☆5,624Feb 8, 2026Updated last week
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,446May 6, 2024Updated last year
- Metasploit Framework☆37,499Updated this week
- The LAZY script will make your life easier, and of course faster.☆4,310Aug 28, 2021Updated 4 years ago
- Efficient and advanced man in the middle framework☆2,161Mar 23, 2023Updated 2 years ago
- This is a multi-use bash script for Linux systems to audit wireless networks.☆7,508Feb 5, 2026Updated last week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆18,844Dec 31, 2025Updated last month
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,600Oct 6, 2025Updated 4 months ago
- CHAOS is a free and open-source Remote Administration Tool that allow generate binaries to control remote operating systems.☆2,770Oct 26, 2024Updated last year
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,434Oct 30, 2023Updated 2 years ago
- A little tool to play with Windows security☆21,268May 11, 2025Updated 9 months ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,246Mar 9, 2020Updated 5 years ago