| FrenchCisco/RATel |
281 |
|
0 |
0 |
about 5 years ago |
0 |
|
0 |
mit |
Python |
| RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software. |
| wraith-labs/wraith |
195 |
|
0 |
0 |
over 2 years ago |
0 |
|
0 |
agpl-3.0 |
Go |
| [WIP] A free and open-source, modular Remote Administration Tool (RAT) / Payload Dropper written in Go(lang) with a flexible command and control (C2) system. |
| 4w4k3/Insanity-Framework |
178 |
|
0 |
0 |
almost 9 years ago |
0 |
|
2 |
bsd-3-clause |
Python |
| Generate Payloads and Control Remote Machines. [Discontinued] |
| zarkones/XENA |
175 |
|
0 |
0 |
over 2 years ago |
0 |
|
11 |
|
TypeScript |
| XENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring secrecy and resiliency over performance. It's micro-service oriented allowing for specialization and lower footprint. Join the community of the ultimate Botnet kit. |
| brows3r/iPwn |
28 |
|
0 |
0 |
almost 5 years ago |
0 |
|
|
|
Python |
| A Framework meant for the exploitation of iOS devices. |
| evildevill/Evilip |
20 |
|
0 |
0 |
about 3 years ago |
0 |
|
0 |
mit |
Python |
| Evilip Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Evilip Framework gives you the power and convenience of remote Android device administration. |
| p0dalirius/RemoteMouse-3.008-Exploit |
15 |
|
0 |
0 |
over 3 years ago |
0 |
|
1 |
|
Python |
| This exploit allows to connect to the remote RemoteMouse 3.008 service to virtually press arbitrary keys and execute code on the machine. |
| Ixve/Red-Team-Tools |
11 |
|
0 |
0 |
over 2 years ago |
0 |
|
1 |
|
|
| Repo containing cracked red teaming tools. |