wmbest2 / rats
☆40Updated 8 years ago
Alternatives and similar repositories for rats:
Users that are interested in rats are comparing it to the libraries listed below
- This is the ToRat server, a part of the ToRat Project.☆23Updated 5 years ago
- python based backdoor software☆17Updated 13 years ago
- SNMP Backdoor Communication Channel☆15Updated 13 years ago
- 🌌 Go-Observe: A command line Mozilla Observatory client written in Go☆12Updated 7 years ago
- Windows Syslog Command Line Client☆15Updated 12 years ago
- Web Application Firewall For Limited Exploitation☆17Updated 7 years ago
- rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing …☆14Updated 2 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- A web app scanner☆26Updated 10 years ago
- Simple SSH vulnerability scanner based on SSH Harvester☆13Updated 7 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- Utility to generate a TLS Certificate.☆17Updated 4 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆16Updated last year
- Custom slash command to do ipinfo.io lookups from within Slack☆10Updated 8 years ago
- Execute tasks across SSH hosts using random selection☆17Updated 4 years ago
- another socks5 server , support linux, BSD , use epoll and kqueue technology☆12Updated 7 years ago
- A reverse socks5 proxy server and client☆18Updated 7 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆17Updated 7 years ago
- A collection of shellcodes☆67Updated 12 years ago
- IronBee Rules☆19Updated 11 years ago
- run ssh, https, and openvpn on the same port☆15Updated 10 years ago
- ☆15Updated 15 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Chrome extension for blocking x-origin cookies☆10Updated 8 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- A phone CNAM lookup utility using the OpenCNAM API☆12Updated 10 years ago