wraith-labs / wraith
[WIP] A free and open-source, modular Remote Administration Tool (RAT) / Payload Dropper written in Go(lang) with a flexible command and control (C2) system.
☆223Updated last year
Alternatives and similar repositories for wraith:
Users that are interested in wraith are comparing it to the libraries listed below
- Open-Source Remote Administration Tool for Windows. 100% FUD Without any Crypter☆167Updated 2 years ago
- An open-source, centralized HTTPS botnet☆172Updated 2 years ago
- UNFINISHED Botnet using a Go and Bootstrap Based C2, Support for Windows, Linux and Android Clients.☆94Updated 2 years ago
- KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detecti…☆359Updated last year
- Decentralised P2P botnet using toxcore.☆170Updated 2 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆177Updated 2 years ago
- RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model,…☆280Updated 3 years ago
- AV evading OSX Backdoor and Crypter Framework☆279Updated last year
- FUD metasploit Persistence RAT☆4Updated 2 years ago
- ☄ 📏☣✒Blue Eagle jRAT is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT] [Linux RAT] [MAC RAT] } which is fully p…☆1Updated 2 years ago
- Basic Multiplatform Remote Administration Tool - Xamarin☆346Updated 4 years ago
- Crypter in Python 3 with advanced functionality, Bypass VM, Encrypt Source with AES & Base64 Encoding | Evil Code is executed by brutefor…☆349Updated 2 years ago
- Decrypt gecko based browsers passwords, cookies, history, bookmarks.☆260Updated 4 years ago
- PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.☆330Updated 4 months ago
- Simple Free Crypter for .NET Trojans like njRAT☆181Updated 5 years ago
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆120Updated last year
- Threat Emulation and Red Teaming Framework, The Hacking Software for normal people.☆251Updated 2 years ago
- Spoof file icons and extensions in Windows☆179Updated 3 months ago
- Program for remote computer management with Telegram on native C++ - by B4DB4B3☆109Updated 3 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆97Updated 3 years ago
- Red Team engagement platform with the goal of unifying offensive tools behind a simple UI☆298Updated last year
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆157Updated last year
- ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication☆995Updated 2 years ago
- Python AV Evasion Tools☆503Updated 2 months ago
- Malware USB Spread | Example C#☆178Updated 5 years ago
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆457Updated 3 months ago
- Arbitrium is a cross-platform, fully undetectable remote access trojan, to control Android, Windows and Linux and doesn't require any fir…☆346Updated 4 years ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆490Updated last year
- Python steal chrome password all version browser are supported 100 % FUD☆285Updated 4 years ago
- Simple obfuscation tool☆510Updated 11 months ago