You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increase the security of the open sourcecode.
☆105May 5, 2025Updated 11 months ago
Alternatives and similar repositories for ANYDESK-BACKDOOR
Users that are interested in ANYDESK-BACKDOOR are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- functions to exploit common web application vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Server-Side Request Forger…☆93Apr 21, 2024Updated 2 years ago
- Anti-forensics tool Inspired by NSA's Marble framework.☆10Apr 17, 2025Updated last year
- 150 Fast prompts OpenAi☆23Dec 28, 2023Updated 2 years ago
- CVE-2024-6387 with auto ip scanner and auto expliot☆11Jul 4, 2024Updated last year
- RAR-NextgenerationAI-expliot (use ai and more new techniques)☆22May 5, 2025Updated 11 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This is a Telegram bot that can download audio from YouTube videos and summarize the content using OpenAI's GPT-3 engine. It's a handy to…☆21Apr 14, 2024Updated 2 years ago
- Demise is Golang malware that uses Discord for communication.☆13Oct 23, 2024Updated last year
- Tools for generating and validating IBANs (International Bank Account Numbers)☆10Aug 11, 2020Updated 5 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- Asqlmap is a terminal interface to automatize the famous SQL Injection's tool sqlmap. It provides a very simple interface to quickly perf…☆25May 1, 2022Updated 4 years ago
- IronPE is a Windows PE manual loader written in Rust for both x86 and x64 PE files.☆117Mar 10, 2026Updated last month
- Simple Ransoware to attack Windows 🌟☆25Apr 19, 2023Updated 3 years ago
- Spoof parent process ID☆14Jan 23, 2019Updated 7 years ago
- exploit-X Create Android Ransomware In Termux (NO ROOT). This Tool automate task of create the android ransomware apk with encryption key…☆29Oct 16, 2025Updated 6 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- GENERATE PYTHON BASED FUD STUB☆20Nov 20, 2023Updated 2 years ago
- ☆18Dec 9, 2023Updated 2 years ago
- Keeping Vichan alive☆17Jul 24, 2023Updated 2 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- LockBit-Black-Builder_ ;this is Lockbit Black Builder☆10Sep 28, 2022Updated 3 years ago
- PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template☆29Dec 7, 2025Updated 4 months ago
- [WIP] Dekompiler is .NET decompiler that converts Cil to C# code.☆31Jun 1, 2024Updated last year
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆16Aug 4, 2023Updated 2 years ago
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆40Sep 16, 2025Updated 7 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Webdav Mass Exploiter With Python Programming Language☆13Jul 19, 2025Updated 9 months ago
- Software Protector☆20Aug 16, 2020Updated 5 years ago
- Web Scanner Tool☆24Mar 13, 2024Updated 2 years ago
- PC免杀远控winos4.0成品☆35Mar 26, 2025Updated last year
- Strong Python Protector & Obfuscator☆10Oct 23, 2020Updated 5 years ago
- This is a Telegram bot designed to back up messages and media files from Telegram chats to a local file system and a SQLite database. It …☆16Aug 20, 2024Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆87May 5, 2023Updated 2 years ago
- 🕷️MITMProxy + Ettercap = PWNd☆11Dec 5, 2018Updated 7 years ago
- A ransomware written in python for Windows☆13Aug 10, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Just another collection of links, tools, reports and other stuff☆24Jun 22, 2021Updated 4 years ago
- Private nuclei templates for BBP and OT/IIoT/MIoT enumeration, use responsibly☆36Aug 27, 2025Updated 8 months ago
- Locate, search and download open Elasticsearch databases☆22Feb 27, 2023Updated 3 years ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆18Apr 17, 2024Updated 2 years ago
- This code is a web scanner tool designed to find vulnerabilities and file upload points on a website. It uses various techniques to bypas…☆21May 4, 2025Updated 11 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆114Jun 16, 2024Updated last year
- Run TTPs, with AI!☆127Feb 23, 2026Updated 2 months ago