An evil RAT (Remote Administration Tool) for macOS / OS X.
☆20Aug 6, 2018Updated 7 years ago
Alternatives and similar repositories for EvilOSX
Users that are interested in EvilOSX are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A pentesting Firefox spy extension - PoC☆10Jun 16, 2016Updated 9 years ago
- General tools and scripts i want to make public to the world.☆47Apr 14, 2019Updated 7 years ago
- Public exploits (re)writed while learning.☆14Aug 7, 2013Updated 12 years ago
- Your Friendly Neighbourhood Honeypot Maker and Manager☆33Mar 20, 2019Updated 7 years ago
- Short little AV Test to check Detection Rates☆20Jan 28, 2021Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆13Aug 31, 2019Updated 6 years ago
- 👾 WHT allow you to disable Windows Defender, Windows Firewall, clear all logs and reverse (Enable Firewall, enable Defender)☆24Aug 27, 2019Updated 6 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Mod Installer for the PC version of Gorilla Tag.☆24Mar 12, 2021Updated 5 years ago
- A short and small memory forensics helper.☆52Oct 18, 2017Updated 8 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Nov 27, 2016Updated 9 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆81May 20, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- Shell and Pen-testing Tool☆17May 14, 2025Updated 11 months ago
- A suite of polyfills supporting the HTML Web Components specs☆16Oct 1, 2019Updated 6 years ago
- A simple web gui for Transmission☆19Sep 25, 2010Updated 15 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆13Dec 13, 2023Updated 2 years ago
- ☆11Oct 9, 2024Updated last year
- ☆26Sep 2, 2025Updated 8 months ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Mar 6, 2021Updated 5 years ago
- ☆15Apr 6, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Set of PoC for exploits for QRadar SIEM☆15Jan 14, 2018Updated 8 years ago
- Run Docker containers with a non-root user by default☆11Mar 17, 2019Updated 7 years ago
- XXE Injection Payloads☆28Jul 30, 2019Updated 6 years ago
- Burp suite Certificate modification tool☆18Apr 23, 2023Updated 3 years ago
- Just a repo that contains a lot of my stuff (miner, config., pools, etc.) , that i have collected on my mining sessions since 2015.☆19Jun 29, 2023Updated 2 years ago
- given the fb url of a user profile, you can report the user as fake profile☆14Apr 19, 2017Updated 9 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆31Sep 30, 2019Updated 6 years ago
- Stargate simulator with DHD and Whormhole☆13May 22, 2019Updated 6 years ago
- Block websites with ease!☆12Jan 17, 2026Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A platform Where A User can Find the Online Presence of Social Media Handle on the Internet.☆12Apr 10, 2021Updated 5 years ago
- Generate images in Arch Linux on device (a smartphone and tablet) with raytracing. https://sdrausty.github.io/TermuxPovray/☆15Jul 29, 2019Updated 6 years ago
- I created the python script to bypass UAC to get system shell .☆122Sep 2, 2019Updated 6 years ago
- Simple but sharp ransomware☆38Jul 11, 2020Updated 5 years ago
- Black box pen-testing and web based CTFs☆17Mar 6, 2023Updated 3 years ago
- A custom script I created because I got tired of installing my tools manually!☆13Nov 19, 2024Updated last year
- Awesome-Cellular-Hacking☆11Jul 9, 2019Updated 6 years ago