swagkarna / WH-RAT
WH-Rat for windows and Android : Usage of WH-HackerExploit Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program. Only use for educat…
☆11Updated 4 years ago
Alternatives and similar repositories for WH-RAT:
Users that are interested in WH-RAT are comparing it to the libraries listed below
- ☆12Updated 2 years ago
- remote administrator framework☆21Updated 5 months ago
- Anubis 7.0☆25Updated 4 months ago
- This Script will get victims exact location by some phishing method..Here is the demo site☆36Updated 2 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Updated 4 years ago
- It's easy to use android botnet work without port forwarding, vps and android studio☆10Updated 2 years ago
- this is the youtube phishing html, use it to grab anyones google account info ! Link : https://pinkythegawd.github.io/youtube-phishing-pa…☆16Updated 3 months ago
- PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing camp…☆30Updated 5 years ago
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆13Updated last year
- (Windows/Linux/Mac) Remote Administration Tool☆61Updated 3 years ago
- #Just simple program to spoofing device by sending malicious link☆29Updated 2 years ago
- Stealph-botnet its a simpel botnet i code this for fun☆26Updated 4 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆17Updated 2 years ago
- Complete and modifyable ransomware program☆11Updated 3 years ago
- Keylogger for ethical hackers☆14Updated 3 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali☆9Updated 2 years ago
- Usage of WH-HackerExploit Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility …☆36Updated 2 years ago
- Best social media phishing☆22Updated 4 years ago
- An advance keylogger that works and also logs special keys.☆18Updated 2 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆51Updated 7 years ago
- ☆26Updated 4 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆21Updated 4 years ago
- Geolocation Spy (GeoSpy) is an OSINT analysis and research tool that is used to track and execute intelligent social engineering attacks …☆19Updated 4 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆23Updated last year
- phishing paypal ,French, English☆24Updated 3 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆15Updated 3 years ago
- ☆15Updated 3 years ago
- Access Windows 10 without password☆13Updated 4 years ago
- Encryptor and File Manager | bypass webshell upload☆29Updated 3 years ago
- NoSecerets is a python script that is designed to crack hashes extremely fast. Faster even than Hashcat☆11Updated 2 years ago