AndroratAndroRAT | Remote Administrator Tool for Android OS Hacking
Stars: ✭ 340 (+996.77%)
Mutual labels: exploit, rat
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Stars: ✭ 1,934 (+6138.71%)
Mutual labels: exploit, rat
ThoronThoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (+180.65%)
Mutual labels: exploit, rat
YAPSYet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (+12.9%)
Mutual labels: exploit, rat
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+3100%)
Mutual labels: exploit, rat
Slickermaster Rev4NSA Hacking Tool Recreation UnitedRake
Stars: ✭ 62 (+100%)
Mutual labels: exploit, rat
AndroratA Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Stars: ✭ 187 (+503.23%)
Mutual labels: exploit, rat
shu-shellWebshell Jumping Edition
Stars: ✭ 23 (-25.81%)
Mutual labels: exploit
HTPHack The Printer
Stars: ✭ 31 (+0%)
Mutual labels: exploit
Rats-MischiefRat's Mischief is a Minecraft mod that adds rats made by RAT and Arathain.
Stars: ✭ 31 (+0%)
Mutual labels: rat
CVE-2018-2380PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM
Stars: ✭ 55 (+77.42%)
Mutual labels: exploit
readhookRed-team tool to hook libc read syscall with a buffer overflow vulnerability.
Stars: ✭ 31 (+0%)
Mutual labels: exploit
PollDaddyHackExploit PollDaddy polls
Stars: ✭ 33 (+6.45%)
Mutual labels: exploit
ADMMutateClassic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia.edu/sites/default/files/ccs07poly.pdf :) If I ever port this to 64 or implement a few other suggestions (sorry I lost ppc code version contributed) it will be orders of magnitude more difficult to spot, so I h…
Stars: ✭ 69 (+122.58%)
Mutual labels: exploit
dirtycowradare2 IO plugin for Linux and Android. Modifies files owned by other users via dirtycow Copy-On-Write cache vulnerability
Stars: ✭ 93 (+200%)
Mutual labels: exploit
minecraft-log4j-honeypotMinecraft Honeypot for Log4j exploit. CVE-2021-44228 Log4Shell LogJam
Stars: ✭ 89 (+187.1%)
Mutual labels: exploit
getroot🛠️ Tool to bypass my school's security system to get sudo privileges on MacOS
Stars: ✭ 34 (+9.68%)
Mutual labels: exploit
overflowA command-line tool for exploiting stack-based buffer overflow vulnerabilities.
Stars: ✭ 66 (+112.9%)
Mutual labels: exploit
xss-http-injectorXSS HTTP Inject0r is a proof of concept tool that shows how XSS (Cross Site Scripting) flags can be exploited easily. It is written in HTML + Javascript + PHP and released under GPLv3.
Stars: ✭ 22 (-29.03%)
Mutual labels: exploit