swagkarna / WH-RAT
WH-Rat for windows and Android : Usage of WH-HackerExploit Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program. Only use for educat…
☆11Updated 4 years ago
Alternatives and similar repositories for WH-RAT:
Users that are interested in WH-RAT are comparing it to the libraries listed below
- ☆12Updated 3 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆21Updated 4 years ago
- An advance keylogger that works and also logs special keys.☆18Updated 2 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆15Updated 4 years ago
- Complete and modifyable ransomware program☆11Updated 3 years ago
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆13Updated last year
- PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing camp…☆30Updated 5 years ago
- Fake Update Website ( On Click Automatic Download Windows Payload )☆11Updated 4 years ago
- this is the youtube phishing html, use it to grab anyones google account info ! Link : https://pinkythegawd.github.io/youtube-phishing-pa…☆16Updated 3 months ago
- Geolocation Spy (GeoSpy) is an OSINT analysis and research tool that is used to track and execute intelligent social engineering attacks …☆19Updated 4 years ago
- forked from linux choice☆18Updated 5 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆17Updated 2 years ago
- It's easy to use android botnet work without port forwarding, vps and android studio☆10Updated 2 years ago
- Using bitsadmin to download our malware and to bypass defender☆27Updated 3 years ago
- Usage of WH-HackerExploit Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility …☆36Updated 2 years ago
- NoSecerets is a python script that is designed to crack hashes extremely fast. Faster even than Hashcat☆11Updated 2 years ago
- Keylogger for ethical hackers☆14Updated 3 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆51Updated 7 years ago
- Using open Adb ports we can exploit a Andriod Device☆20Updated 5 years ago
- [Script] Encrypt and Decrypt messages with python.☆8Updated 2 years ago
- ⚡ Create infinate UAC prompts forcing a user to run as admin ⚡☆11Updated 2 years ago
- A hacking panel based in Kali tools and more! Only with educational porpuses. The author is not responsable for any damage☆12Updated 3 years ago
- its Email Extractor its non stoply extracting email from website...☆12Updated 4 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali☆9Updated 2 years ago
- Payload delivery via URL and some social engineering.☆17Updated 7 months ago
- Anubis 7.0☆25Updated 4 months ago
- Rat an Windows device using Telegram.Bot API☆8Updated 2 years ago
- Latest FUD GMail phishing webpage generator☆27Updated 4 years ago
- Stealer of sessions of the Telegram Desktop application on windows 7, 8 and 10 🔑☆9Updated 4 years ago
- Access Windows 10 without password☆13Updated 4 years ago