NameDescription
A tool to convert executable files to Word documents, often used in exploit scenarios.
A crypter used to encrypt and obfuscate malware to avoid detection by antivirus software.
A Remote Access Trojan (RAT) that allows attackers to control a target machine remotely.
A builder for creating ransomware, allowing the attacker to encrypt victim's files for ransom.
A popular platform for web application security testing.
A tool for creating custom ransomware, version 4.
A remote access tool used for controlling a target machine remotely, version 4.9.3.
Tools and scripts designed for Distributed Denial of Service (DDoS) attacks.
A crypter for encrypting malicious code to evade detection.
A tool to analyze and identify executable files.
A tool for creating HTML Application (HTA) exploits.
A Fully Undetectable (FUD) crypter to obfuscate malware.
A binder tool for combining multiple files into a single executable.
Tools for collecting and analyzing logs.
A web testing suite used for scraping, brute force attacks, and checking credentials.
A powerful remote access tool for spying on target devices.
A stealer malware that extracts sensitive information from target systems.
A tool to convert images to icon files, often exploited for malicious purposes.
A Remote Access Trojan for controlling target machines.
A RAT used to spy on Android devices.
A RAT with hidden VNC capabilities, allowing for hidden remote desktop sessions.
A crypter for obfuscating APK files to avoid detection.
A version of the 888 RAT for remote access and control.
Setup and tutorial for Anubis, a well-known Android RAT.
A tool for automated Google dorking to find vulnerable web pages.
A RAT targeting Android devices.
A cracked version of BurpBountyPro for extending Burp Suite capabilities.
A tool for creating custom ransomware, version 5.
CraxsRat-V3 2023 is a remote access tool (RAT) designed for controlling and managing targeted computer systems remotely.
A crypter for encrypting Android APK files.
Tools for hacking and gaining access to WiFi networks.
A crypter for encrypting and obfuscating malicious code.
A tool for unlocking and bypassing security measures on devices.
The latest version of Remcos RAT bundled with a crypter.
A lightweight remote access tool.
A web panel for managing various RATs and exploits.
A tool for creating and deploying multiple types of exploits.
A powerful remote access tool with extensive capabilities.
A premium version of the Quasar RAT for remote control.
A stealer malware designed to extract sensitive information from target systems.
A builder for creating stealthy cryptocurrency miners.
Setup for Technitium MAC Address Changer, used to spoof MAC addresses.
A remote access tool for controlling target machines, 2023 edition.
A master version of the WH-RAT for remote access.
Software designed to securely erase all data on a hard drive
A tool for decompiling and recompiling APK files.
A Remote Access Trojan targeting various platforms.
A binder tool for combining multiple files into one executable.
A penetration testing tool used for advanced threat emulation.
A popular Remote Access Trojan used for controlling target machines.
A post-exploitation framework for conducting various attacks.
A collection of exploits for testing vulnerabilities in systems.
A widely used framework for developing and executing exploits.
A vulnerability scanner used to identify potential security issues in systems.
A network scanning tool used to discover hosts and services on a network.
A network protocol analyzer used for network troubleshooting and analysis.
An integrated penetration testing tool for finding vulnerabilities in web applications.