AiGptCode / ANYDESK-BACKDOOR
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increase the security of the open sourcecode.
☆69Updated 11 months ago
Alternatives and similar repositories for ANYDESK-BACKDOOR:
Users that are interested in ANYDESK-BACKDOOR are comparing it to the libraries listed below
- Simple Powershell Http shell With WEB UI☆70Updated 3 months ago
- GENERATE PYTHON BASED FUD STUB☆19Updated last year
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆35Updated last year
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆91Updated 4 months ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆24Updated last year
- Here are +200 different rats some with source code☆90Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- POC Pdf-exploit builder on C#☆131Updated last year
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆21Updated 2 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆75Updated last year
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆101Updated last year
- The africana-framework is a software designed for network & web hacking by automating as much stuff as possible to detect vulnerabilities…☆29Updated 2 weeks ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- This is a exploit with the capability to control ip camera movement even without a username and password.☆56Updated 6 months ago
- Social Engineering Browser Update Attack.☆55Updated last year
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆160Updated 7 months ago
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆58Updated 3 years ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆32Updated 8 months ago
- Gmail/GSuite account enumeration tool☆50Updated last year
- A tool for automatically change the Tor IP address over time. Maximize anonymity!☆60Updated last month
- Boost website hits by generating requests from multiple proxy IPs.☆59Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆127Updated 2 years ago
- Spearphishing tools, generate masqueraded pocket executable☆96Updated last year
- ⚡ Scan World FTP Servers and Steal Their Data 🌍☆35Updated last month
- Disable Windows:Defender,Firewall,SmartScreen with python file☆31Updated 4 years ago
- Anubis 8.0 Android RAT☆90Updated last month
- This repository contains a few leaked files of HookBot.☆104Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆40Updated 5 months ago