ToratToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Stars: ✭ 415 (+273.87%)
HerakeyloggerChrome Keylogger Extension | Post Exploitation Tool
Stars: ✭ 138 (+24.32%)
Teardroid-phprat🇮🇳 🤖 It's easy to use android botnet work without port forwarding, vps and android studio
Stars: ✭ 417 (+275.68%)
PyexfilA Python Package for Data Exfiltration
Stars: ✭ 554 (+399.1%)
WpforceWordpress Attack Suite
Stars: ✭ 633 (+470.27%)
ThoronThoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-21.62%)
Vipermetasploit-framework 图形界面 / 图形化内网渗透工具
Stars: ✭ 487 (+338.74%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+793.69%)
Gtfobins.github.ioGTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Stars: ✭ 6,030 (+5332.43%)
Mssqlproxymssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
Stars: ✭ 433 (+290.09%)
PupyPupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Stars: ✭ 6,737 (+5969.37%)
TinkerershellA simple python reverse shell written just for fun.
Stars: ✭ 62 (-44.14%)
BeeloggerGenerate Gmail Emailing Keyloggers to Windows.
Stars: ✭ 605 (+445.05%)
ArchivistA ctypes powered python keylogger.
Stars: ✭ 92 (-17.12%)
BlackmambaC2/post-exploitation framework
Stars: ✭ 544 (+390.09%)
RadiumPython logger with multiple features.
Stars: ✭ 492 (+343.24%)
Keylogger🔐 Open Source Python Keylogger Collection
Stars: ✭ 97 (-12.61%)
Rat Via TelegramWindows Remote Administration Tool via Telegram
Stars: ✭ 453 (+308.11%)
Pylogger🐍 A Python Keylogger for Windows
Stars: ✭ 36 (-67.57%)
Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (+1042.34%)
Spytrojan keylogger[Solo para programadores] Troyano espía | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. | Envío de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
Stars: ✭ 32 (-71.17%)
Emp3r0rlinux post-exploitation framework made by linux user
Stars: ✭ 419 (+277.48%)
SifterSifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (+263.06%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+6883.78%)
ByobAn open-source post-exploitation framework for students, researchers and developers.
Stars: ✭ 6,949 (+6160.36%)
Spykeyboardkeylogger which sends us the data to our gmail.
Stars: ✭ 95 (-14.41%)
KeyloggerGet Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (+444.14%)
Blazerat🔥 Control your Linux home computer with telegram bot.
Stars: ✭ 60 (-45.95%)
BasharkBash post exploitation toolkit
Stars: ✭ 602 (+442.34%)
CromosCromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.
Stars: ✭ 103 (-7.21%)
Spy👀 Linux kernel mode debugfs keylogger
Stars: ✭ 546 (+391.89%)
Decryptrdcmanager.NET 4.0 Remote Desktop Manager Password Gatherer
Stars: ✭ 59 (-46.85%)
Saint👁 (s)AINT is a Spyware Generator for Windows systems written in Java. [Discontinued]
Stars: ✭ 522 (+370.27%)
KeyloggerA powerful C keylogger for Windows.
Stars: ✭ 89 (-19.82%)
Logkeys📝 ⌨️ A GNU/Linux keylogger that works!
Stars: ✭ 518 (+366.67%)
KeyloggerA simple keylogger for Windows, Linux and Mac
Stars: ✭ 1,007 (+807.21%)
VegileThis tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 478 (+330.63%)
Punk.pyunix SSH post-exploitation 1337 tool
Stars: ✭ 107 (-3.6%)
Go ShellcodeLoad shellcode into a new process
Stars: ✭ 456 (+310.81%)
Swift KeyloggerKeylogger for mac written in Swift using HID
Stars: ✭ 995 (+796.4%)
Gobot2Second Version of The GoBot Botnet, But more advanced.
Stars: ✭ 431 (+288.29%)
Atomic Red Team Intelligence C2ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Stars: ✭ 87 (-21.62%)
PowerhubA post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
Stars: ✭ 431 (+288.29%)
Badusb botnet👥😈 Infect a pc with badusb and establish a connection through telegram.
Stars: ✭ 32 (-71.17%)
CovertutilsA framework for Backdoor development!
Stars: ✭ 424 (+281.98%)
Rat Hodin V2.9Remote Administration Tool for Linux
Stars: ✭ 97 (-12.61%)
SkyratSkyRAT - Powershell Remote Administration Tool
Stars: ✭ 21 (-81.08%)
KeyloggerA no-frills keylogger for Mac OS X.
Stars: ✭ 372 (+235.14%)
PxenumA shell script that automatically performs a series of *NIX enumeration tasks.
Stars: ✭ 30 (-72.97%)
ParadoxiaratParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 395 (+255.86%)
PhpsploitFull-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+970.27%)
Swap digger swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Stars: ✭ 354 (+218.92%)
Venomvenom - shellcode generator/compiler/handler (metasploit)
Stars: ✭ 904 (+714.41%)
Awesome Malware💻⚠️ A curated collection of awesome malware, botnets, and other post-exploitation tools.
Stars: ✭ 108 (-2.7%)
Inferno🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (-5.41%)