You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increase the security of the open sourcecode.
☆102May 5, 2025Updated 11 months ago
Alternatives and similar repositories for ANYDESK-BACKDOOR
Users that are interested in ANYDESK-BACKDOOR are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- retrieve comprehensive information about a website, including its title, last modified date, DNS information, subdomains, firewall names,…☆16Mar 24, 2024Updated 2 years ago
- This code implements an Advanced Prompt Hacking Tester, which allows users to test the responses of an AI system by generating various ty…☆12Apr 14, 2024Updated last year
- 150 Fast prompts OpenAi☆23Dec 28, 2023Updated 2 years ago
- RAR-NextgenerationAI-expliot (use ai and more new techniques)☆21May 5, 2025Updated 11 months ago
- This is a Telegram bot that can download audio from YouTube videos and summarize the content using OpenAI's GPT-3 engine. It's a handy to…☆22Apr 14, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Tools for generating and validating IBANs (International Bank Account Numbers)☆10Aug 11, 2020Updated 5 years ago
- Simple script to bulk check if IPs match networks☆11Jan 11, 2022Updated 4 years ago
- A simple Meterpreter stager written in Rust.☆44Nov 2, 2025Updated 5 months ago
- ☆52Apr 1, 2022Updated 4 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- Asqlmap is a terminal interface to automatize the famous SQL Injection's tool sqlmap. It provides a very simple interface to quickly perf…☆26May 1, 2022Updated 3 years ago
- Simple Ransoware to attack Windows 🌟☆26Apr 19, 2023Updated 2 years ago
- Lurker is a cross-platform, companion implant to Cobalt Strike built with Go☆33Mar 27, 2026Updated 2 weeks ago
- Reverse shell written on python3☆61Sep 16, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Spoof parent process ID☆14Jan 23, 2019Updated 7 years ago
- exploit-X Create Android Ransomware In Termux (NO ROOT). This Tool automate task of create the android ransomware apk with encryption key…☆29Oct 16, 2025Updated 5 months ago
- GENERATE PYTHON BASED FUD STUB☆19Nov 20, 2023Updated 2 years ago
- This project implements a cybersecurity system for detecting anomalies and intrusions in network traffic. It utilizes machine learning mo…☆15Mar 27, 2024Updated 2 years ago
- ☆18Dec 9, 2023Updated 2 years ago
- Keeping Vichan alive☆17Jul 24, 2023Updated 2 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template☆29Dec 7, 2025Updated 4 months ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆16Aug 4, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago
- Simulation of Akira Ransomware with Invoke-AtomicTest☆18Jul 10, 2024Updated last year
- This is a Telegram bot designed to back up messages and media files from Telegram chats to a local file system and a SQLite database. It …☆15Aug 20, 2024Updated last year
- Fresh malware samples caught in the wild daily from random places. 🎣☆20Jun 27, 2019Updated 6 years ago
- PC免杀远控winos4.0成品☆34Mar 26, 2025Updated last year
- Strong Python Protector & Obfuscator☆10Oct 23, 2020Updated 5 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆87May 5, 2023Updated 2 years ago
- 🕷️MITMProxy + Ettercap = PWNd☆11Dec 5, 2018Updated 7 years ago
- A ransomware written in python for Windows☆13Aug 10, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ethereum wallet balance checker☆26May 9, 2023Updated 2 years ago
- Just another collection of links, tools, reports and other stuff☆24Jun 22, 2021Updated 4 years ago
- Private nuclei templates for BBP and OT/IIoT/MIoT enumeration, use responsibly☆36Aug 27, 2025Updated 7 months ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆19May 23, 2022Updated 3 years ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆18Apr 17, 2024Updated last year
- Run TTPs, with AI!☆123Feb 23, 2026Updated last month
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆50Jul 6, 2025Updated 9 months ago