pig
remote_hacker_probe
pig | remote_hacker_probe | |
---|---|---|
1 | 11 | |
459 | 222 | |
- | 0.0% | |
1.8 | 0.0 | |
over 3 years ago | about 2 years ago | |
C | C | |
GNU General Public License v3.0 only | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pig
-
Awesome Penetration Testing
pig - GNU/Linux packet crafting tool.
remote_hacker_probe
- The Remote Hacker Probe | Cross Platform Java Remote Access And Post Exploitation Framework targeting Windows with a multitude of features. Built for Penetration Testers.
- Windows Rat Written in Java ---> Fud
- Windows RAT Written in Java --> Fully undetectable
- Windows Rat Written in Java (Fud)
- Windows Rat Written in Java ---> Fully Undetectable
- Windows Rat Written in Java ---> Fullly Undetectable
- The Remote Hacker Probe, Java/C++ RAT
What are some alternatives?
snappy-fox - 🦀🦊 Snappy (Firefox morgue cache format) files de-compressor, works even if they're corrupted
Keylogger - A simple keylogger for Windows, Linux and Mac
network-testing - This is a small collection of GPLv3-licensed tools to assist an intrepid researcher in testing the performance of networks, wired or wireless.
RATwurst - Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.
Kaitai Struct - Kaitai Struct: declarative language to generate binary data parsers in C++ / C# / Go / Java / JavaScript / Lua / Nim / Perl / PHP / Python / Ruby
TheFatRat - Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
bettercap - The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
tsuki-sploit - A USB-based script for Ethical hacking with multiple attacks
SQLMap - Automatic SQL injection and database takeover tool
casper-fs - Casper-fs is a Custom Hidden Linux Kernel Module generator. Each module works in the file system to protect and hide secret files.
pwntools - CTF framework and exploit development library