3ct0s / fud-backdoor
Create a fully undetectable backdoor with simple steps.
☆73Updated 2 years ago
Alternatives and similar repositories for fud-backdoor:
Users that are interested in fud-backdoor are comparing it to the libraries listed below
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆25Updated last year
- FUD metasploit Persistence RAT☆4Updated 2 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆75Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆58Updated 3 years ago
- A Hidden and Undetectable Remote Access Tool written in C++ and Server in Python3.☆63Updated last year
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆62Updated 3 years ago
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆156Updated last year
- AV evading OSX Backdoor and Crypter Framework☆279Updated last year
- ☆20Updated last year
- The purpose of this tool is to test the window10 defender protection and also other antivirus protection.☆92Updated last year
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆176Updated 2 years ago
- Free advanced and modern Windows botnet with a nice and secure PHP panel developed using VB.NET.☆51Updated 4 years ago
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆32Updated 2 years ago
- Tool to evade Antivirus With Different Techniques☆170Updated last year
- New Redline Leak☆128Updated 4 years ago
- A builder for BatchStealer☆22Updated 2 years ago
- A Remote Administration Tool (RAT) for Windows written in C++ with a fancy C.L.I.☆57Updated last year
- steal chrome saved passwords "undetectable"☆49Updated 2 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆127Updated 2 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆177Updated 2 years ago
- (Beta) RES0LUTI0N is a malware builder undetected by Windows Defender with an anti-VM coded in python and C#. It uses a triple layer rand…☆47Updated 10 months ago
- C2 server to connect to a victim machine via reverse shell☆51Updated 3 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆40Updated 2 years ago
- ⛤Keylogger Generator for Windows written in Python⛤☆51Updated last year
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆240Updated 4 years ago
- Chrome Credential Stealer that reports to Discord through Webhooks☆40Updated 3 years ago
- Cronos Crypter is an simple example of crypter created for educational purposes.☆95Updated 5 months ago
- Koadic C3 COM Command & Control - JScript RAT☆43Updated 7 years ago
- blackhole is a ransomware coded in c#☆28Updated 4 years ago