You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increase the security of the open sourcecode.
☆105May 5, 2025Updated last year
Alternatives and similar repositories for ANYDESK-BACKDOOR
Users that are interested in ANYDESK-BACKDOOR are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- retrieve comprehensive information about a website, including its title, last modified date, DNS information, subdomains, firewall names,…☆16Mar 24, 2024Updated 2 years ago
- functions to exploit common web application vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Server-Side Request Forger…☆93Apr 21, 2024Updated 2 years ago
- Anti-forensics tool Inspired by NSA's Marble framework.☆10Apr 17, 2025Updated last year
- This code implements an Advanced Prompt Hacking Tester, which allows users to test the responses of an AI system by generating various ty…☆13Apr 14, 2024Updated 2 years ago
- 150 Fast prompts OpenAi☆23Dec 28, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- CVE-2024-6387 with auto ip scanner and auto expliot☆11Jul 4, 2024Updated last year
- RAR-NextgenerationAI-expliot (use ai and more new techniques)☆22May 5, 2025Updated last year
- Demise is Golang malware that uses Discord for communication.☆13Oct 23, 2024Updated last year
- Tools for generating and validating IBANs (International Bank Account Numbers)☆10Aug 11, 2020Updated 5 years ago
- A simple Meterpreter stager written in Rust.☆45Nov 2, 2025Updated 6 months ago
- ☆53Apr 1, 2022Updated 4 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- Asqlmap is a terminal interface to automatize the famous SQL Injection's tool sqlmap. It provides a very simple interface to quickly perf…☆25May 1, 2022Updated 4 years ago
- Simple script to bulk check if IPs match networks☆12Jan 11, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- IronPE is a Windows PE manual loader written in Rust for both x86 and x64 PE files.☆120Mar 10, 2026Updated 2 months ago
- Simple Ransoware to attack Windows 🌟☆25Apr 19, 2023Updated 3 years ago
- Spoof parent process ID☆14Jan 23, 2019Updated 7 years ago
- exploit-X Create Android Ransomware In Termux (NO ROOT). This Tool automate task of create the android ransomware apk with encryption key…☆29Oct 16, 2025Updated 7 months ago
- GENERATE PYTHON BASED FUD STUB☆20Nov 20, 2023Updated 2 years ago
- This project implements a cybersecurity system for detecting anomalies and intrusions in network traffic. It utilizes machine learning mo…☆15Mar 27, 2024Updated 2 years ago
- Keeping Vichan alive☆18Jul 24, 2023Updated 2 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Chrome Credential Stealer that reports to Discord through Webhooks☆39Mar 11, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- [WIP] Dekompiler is .NET decompiler that converts Cil to C# code.☆31Jun 1, 2024Updated last year
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆16Aug 4, 2023Updated 2 years ago
- PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template☆31Dec 7, 2025Updated 5 months ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆40Sep 16, 2025Updated 8 months ago
- Webdav Mass Exploiter With Python Programming Language☆13Jul 19, 2025Updated 10 months ago
- Software Protector☆20Aug 16, 2020Updated 5 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆20Jun 27, 2019Updated 6 years ago
- PC免杀远控winos4.0成品☆37Mar 26, 2025Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Strong Python Protector & Obfuscator☆10Oct 23, 2020Updated 5 years ago
- This is Command and Control (C2) Framework (cli / c2-server / implant)☆19Sep 2, 2024Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆87May 5, 2023Updated 3 years ago
- 🕷️MITMProxy + Ettercap = PWNd☆11Dec 5, 2018Updated 7 years ago
- ethereum wallet balance checker☆25May 9, 2023Updated 3 years ago
- A ransomware written in python for Windows☆13Aug 10, 2022Updated 3 years ago
- Private nuclei templates for BBP and OT/IIoT/MIoT enumeration, use responsibly☆36Aug 27, 2025Updated 8 months ago