Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
☆11,210Mar 17, 2024Updated 2 years ago
Alternatives and similar repositories for TheFatRat
Users that are interested in TheFatRat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,972Mar 22, 2024Updated 2 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,214Oct 9, 2023Updated 2 years ago
- Python Remote Administration Tool (RAT)☆3,593Jan 4, 2024Updated 2 years ago
- Android Remote Administration Tool☆5,144Aug 12, 2021Updated 4 years ago
- Remote Administration Tool for Windows☆9,828Feb 29, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Attack Surface Management Platform☆9,727Apr 29, 2026Updated last week
- venom - C2 shellcode generator/compiler/handler☆1,947Dec 9, 2023Updated 2 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,910Jan 24, 2024Updated 2 years ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,325Nov 1, 2025Updated 6 months ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,465Nov 3, 2018Updated 7 years ago
- Undetectable Windows Payload Generation☆1,608Nov 8, 2022Updated 3 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,835Jan 19, 2020Updated 6 years ago
- Exploitation Framework for Embedded Devices☆13,105May 5, 2026Updated last week
- MSFvenom Payload Creator (MSFPC)☆1,324May 9, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,406Feb 10, 2021Updated 5 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆2,351Sep 12, 2022Updated 3 years ago
- A swiss army knife for pentesting networks☆9,126Dec 6, 2023Updated 2 years ago
- A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side☆4,763Jul 17, 2024Updated last year
- Python antivirus evasion tool☆1,450Oct 21, 2023Updated 2 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,336Jan 23, 2018Updated 8 years ago
- The LAZY script will make your life easier, and of course faster.☆4,321Aug 28, 2021Updated 4 years ago
- The Rogue Access Point Framework☆14,584Feb 4, 2025Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,312Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- AntiVirus Evasion Tool☆1,752Apr 23, 2025Updated last year
- Metasploit Framework☆38,136Updated this week
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,906Apr 25, 2024Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆77,621Apr 22, 2026Updated 2 weeks ago
- Efficient and advanced man in the middle framework☆2,181Mar 23, 2023Updated 3 years ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆19,172Apr 18, 2026Updated 3 weeks ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,975Aug 17, 2020Updated 5 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,258Mar 9, 2020Updated 6 years ago
- Credentials recovery project☆10,807Sep 18, 2025Updated 7 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆1,085Jan 13, 2023Updated 3 years ago
- Official Black Hat Arsenal Security Tools Repository☆4,279Aug 26, 2024Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15,062Oct 6, 2025Updated 7 months ago
- This is a multi-use bash script for Linux systems to audit wireless networks.☆7,711May 4, 2026Updated last week
- Automated All-in-One OS Command Injection Exploitation Tool☆5,722May 1, 2026Updated last week
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,439Oct 30, 2023Updated 2 years ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14,840Oct 21, 2024Updated last year