Here are +200 different rats some with source code
☆156Oct 3, 2023Updated 2 years ago
Alternatives and similar repositories for Remote-administration-tools-archive
Users that are interested in Remote-administration-tools-archive are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 5 months ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆192Jul 30, 2024Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Dec 20, 2023Updated 2 years ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Tool for bypassing logins vulnerable against SQL injection☆45Apr 3, 2024Updated 2 years ago
- ☆26Nov 7, 2023Updated 2 years ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year
- ☆25Dec 28, 2023Updated 2 years ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated last year
- Inject DLLs into the explorer process using icons☆407May 18, 2025Updated 10 months ago
- aiohttp LFI (CVE-2024-23334)☆27Mar 19, 2024Updated 2 years ago
- Monarch - The Adversary Emulation Toolkit☆64Jan 7, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆13Dec 21, 2023Updated 2 years ago
- Brute forcing login pages with SQL Injection queries with cURL☆17Feb 23, 2023Updated 3 years ago
- Analyse MSI files for vulnerabilities☆142Aug 30, 2024Updated last year
- Python-based web scraper for a darkweb marketplace on the Tor network.☆40Sep 12, 2024Updated last year
- This is an AD pentest tools collection☆59Jul 6, 2024Updated last year
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆266Mar 22, 2026Updated 3 weeks ago
- POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file.☆126Jul 12, 2024Updated last year
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆273Dec 23, 2024Updated last year
- ☆27Jun 24, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆187Mar 14, 2026Updated last month
- A simple script to obfuscate batch(bat) code easily☆26Oct 21, 2023Updated 2 years ago
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…☆14Jun 15, 2023Updated 2 years ago
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆20Jul 16, 2024Updated last year
- A curated collection of amazing software, libraries, documents, books, resources, and other cool security-related content.☆14Nov 13, 2024Updated last year
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated 2 years ago
- Common password lists, filtered by complexity and length policy.☆16Sep 22, 2021Updated 4 years ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆96Oct 7, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- DDos attack☆13Feb 13, 2023Updated 3 years ago
- Embed a payload inside a PNG file☆373Oct 24, 2024Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Sep 29, 2025Updated 6 months ago
- In-Memory Rootkit For Linux and BSD☆87Aug 9, 2025Updated 8 months ago
- CosmicSting (CVE-2024-34102)☆48Sep 5, 2024Updated last year
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Sep 15, 2024Updated last year
- EDR & Antivirus Bypass to Gain Shell Access☆246Sep 30, 2024Updated last year