wille / jrat-remover
Removes any instance of jRAT on your machine
☆18Updated 8 years ago
Alternatives and similar repositories for jrat-remover:
Users that are interested in jrat-remover are comparing it to the libraries listed below
- Transferring Backdoor Payload by BSSID and Wireless traffic☆57Updated last year
- Advanced Netstat Using Python For Windows☆45Updated 7 years ago
- ☆21Updated 8 years ago
- Social Engineering: Simple way to make a fake file for Backdoors☆25Updated last year
- ~ BannerGrab☆26Updated 8 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆79Updated 6 years ago
- Simple C# reverse shell with shellcode and process injection☆40Updated 8 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Download and Inject code into Google Chrome extensions☆13Updated 7 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆29Updated 8 years ago
- CVE-2017-8570 Exploit☆21Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Uses InstallUtil.exe to load a compatible executable from a network share.☆12Updated 8 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆40Updated 3 years ago
- Custom stagers with python encrypting proxy☆40Updated 9 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 7 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- ☆52Updated 10 years ago
- Empire HTTP(S) C2 redirector setup script☆47Updated 6 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆60Updated 9 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆60Updated 9 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Updated 7 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago