Highlights
- Pro
Stars
Windows Remote Administration Tool via Telegram
Contributed for those who want to learn how to write code in C++. This repository covers concepts from the basic to the advanced level. Comments added in each program for getting better grasp of th…
An open-source post-exploitation framework for students, researchers and developers.
🦎Triton_RAT is free and easy to use, one of the best remote administration tools written in Python, fully integrated with Telegram🦎
TgRAT is a multi-client Command & Control (C2) framework that uses a Telegram group with forum topics as a communication channel between a central server and its agents. Each agent creates a dedica…
Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.
Stealthy Linux Kernel Rootkit for modern kernels (6x)
BC-SECURITY / Empire
Forked from EmpireProject/EmpireEmpire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
A tool that allows you to make TOR your default gateway and send all internet connections under TOR (as transparent proxy) to increase privacy/anonymity without extra unnecessary code.
Collection of various malicious functionality to aid in malware development
Google dork queries targeting URLs with potential vulnerabilities
This Python framework provides a suite of tools for offensive security operations, reconnaissance, intelligence gathering, and more, all within an interactive command-line interface.
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and th…
A Python bot that scrapes, verifies, and selects free proxies for HTTP requests.
fengjixuchui / idapython-3
Forked from Ana06/idapythonMy IDA Python scripts.
A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone who is just interested in infosec topics.
A collection of several hundred online tools for OSINT
GeoIntel using Google's Gemini API to uncover the location where photos were taken through AI-powered geo-location analysis.
A curated list of GPT agents for cybersecurity
This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter
Demonized Shell is an Advanced Tool for persistence in linux.
