Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
☆11,108Mar 17, 2024Updated 2 years ago
Alternatives and similar repositories for TheFatRat
Users that are interested in TheFatRat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,957Mar 22, 2024Updated 2 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,216Oct 9, 2023Updated 2 years ago
- Python Remote Administration Tool (RAT)☆3,565Jan 4, 2024Updated 2 years ago
- Android Remote Administration Tool☆5,096Aug 12, 2021Updated 4 years ago
- Remote Administration Tool for Windows☆9,776Feb 29, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Attack Surface Management Platform☆9,622Feb 15, 2026Updated last month
- venom - C2 shellcode generator/compiler/handler☆1,945Dec 9, 2023Updated 2 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,907Jan 24, 2024Updated 2 years ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,310Nov 1, 2025Updated 5 months ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,457Nov 3, 2018Updated 7 years ago
- Undetectable Windows Payload Generation☆1,610Nov 8, 2022Updated 3 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,833Jan 19, 2020Updated 6 years ago
- Exploitation Framework for Embedded Devices☆13,045Mar 2, 2026Updated 3 weeks ago
- MSFvenom Payload Creator (MSFPC)☆1,317May 9, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,400Feb 10, 2021Updated 5 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆2,346Sep 12, 2022Updated 3 years ago
- A swiss army knife for pentesting networks☆9,108Dec 6, 2023Updated 2 years ago
- A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side☆4,672Jul 17, 2024Updated last year
- Python antivirus evasion tool☆1,450Oct 21, 2023Updated 2 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,324Jan 23, 2018Updated 8 years ago
- The Rogue Access Point Framework☆14,516Feb 4, 2025Updated last year
- The LAZY script will make your life easier, and of course faster.☆4,318Aug 28, 2021Updated 4 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,216Sep 29, 2025Updated 6 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- AntiVirus Evasion Tool☆1,748Apr 23, 2025Updated 11 months ago
- Metasploit Framework☆37,798Updated this week
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,816Apr 25, 2024Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,476Mar 16, 2026Updated 2 weeks ago
- Efficient and advanced man in the middle framework☆2,178Mar 23, 2023Updated 3 years ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆19,002Mar 20, 2026Updated last week
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,924Aug 17, 2020Updated 5 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,254Mar 9, 2020Updated 6 years ago
- Credentials recovery project☆10,735Sep 18, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆1,080Jan 13, 2023Updated 3 years ago
- Official Black Hat Arsenal Security Tools Repository☆4,246Aug 26, 2024Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,778Oct 6, 2025Updated 5 months ago
- This is a multi-use bash script for Linux systems to audit wireless networks.☆7,607Updated this week
- Automated All-in-One OS Command Injection Exploitation Tool☆5,687Mar 22, 2026Updated last week
- CHAOS is a free and open-source Remote Administration Tool that allow generate binaries to control remote operating systems.☆2,785Oct 26, 2024Updated last year
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14,703Oct 21, 2024Updated last year