Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
☆11,150Mar 17, 2024Updated 2 years ago
Alternatives and similar repositories for TheFatRat
Users that are interested in TheFatRat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,968Mar 22, 2024Updated 2 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,213Oct 9, 2023Updated 2 years ago
- Python Remote Administration Tool (RAT)☆3,580Jan 4, 2024Updated 2 years ago
- Android Remote Administration Tool☆5,133Aug 12, 2021Updated 4 years ago
- Remote Administration Tool for Windows☆9,792Feb 29, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Attack Surface Management Platform☆9,673Feb 15, 2026Updated 2 months ago
- venom - C2 shellcode generator/compiler/handler☆1,941Dec 9, 2023Updated 2 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,905Jan 24, 2024Updated 2 years ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,321Nov 1, 2025Updated 5 months ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,460Nov 3, 2018Updated 7 years ago
- Undetectable Windows Payload Generation☆1,608Nov 8, 2022Updated 3 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,837Jan 19, 2020Updated 6 years ago
- Exploitation Framework for Embedded Devices☆13,072Mar 2, 2026Updated last month
- MSFvenom Payload Creator (MSFPC)☆1,323May 9, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,406Feb 10, 2021Updated 5 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆2,346Sep 12, 2022Updated 3 years ago
- A swiss army knife for pentesting networks☆9,124Dec 6, 2023Updated 2 years ago
- A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side☆4,724Jul 17, 2024Updated last year
- Python antivirus evasion tool☆1,448Oct 21, 2023Updated 2 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,327Jan 23, 2018Updated 8 years ago
- The LAZY script will make your life easier, and of course faster.☆4,319Aug 28, 2021Updated 4 years ago
- The Rogue Access Point Framework☆14,543Feb 4, 2025Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,249Sep 29, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- AntiVirus Evasion Tool☆1,750Apr 23, 2025Updated 11 months ago
- Metasploit Framework☆37,978Updated this week
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,868Apr 25, 2024Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆77,041Updated this week
- Efficient and advanced man in the middle framework☆2,177Mar 23, 2023Updated 3 years ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆19,086Updated this week
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,948Aug 17, 2020Updated 5 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,255Mar 9, 2020Updated 6 years ago
- Credentials recovery project☆10,781Sep 18, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆1,080Jan 13, 2023Updated 3 years ago
- Official Black Hat Arsenal Security Tools Repository☆4,260Aug 26, 2024Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,944Oct 6, 2025Updated 6 months ago
- This is a multi-use bash script for Linux systems to audit wireless networks.☆7,660Updated this week
- Automated All-in-One OS Command Injection Exploitation Tool☆5,704Apr 15, 2026Updated last week
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,434Oct 30, 2023Updated 2 years ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14,790Oct 21, 2024Updated last year