AiGptCode / ANYDESK-BACKDOORLinks
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increase the security of the open sourcecode.
☆83Updated 3 months ago
Alternatives and similar repositories for ANYDESK-BACKDOOR
Users that are interested in ANYDESK-BACKDOOR are comparing it to the libraries listed below
Sorting:
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated last year
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆39Updated last year
- POC | Steal user WhatsApp information/data☆71Updated 2 months ago
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆36Updated last year
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆108Updated 2 years ago
- Here are +200 different rats some with source code☆106Updated last year
- Spearphishing tools, generate masqueraded pocket executable☆102Updated 2 years ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆36Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆123Updated 2 years ago
- Simple Powershell Http shell With WEB UI☆72Updated 4 months ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆184Updated last year
- 🦎Triton_RAT is free and easy to use, one of the best remote administration tools written in Python, fully integrated with Telegram🦎☆56Updated last month
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆118Updated 3 months ago
- ⚡ Scan World FTP Servers and Steal Their Data 🌍☆47Updated 6 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆138Updated 3 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆63Updated 4 years ago
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆46Updated 9 months ago
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- GENERATE PYTHON BASED FUD STUB☆20Updated last year
- Tool to evade Antivirus With Different Techniques☆185Updated last year
- Create a fully undetectable backdoor with simple steps.☆74Updated 3 years ago
- Social Engineering Browser Update Attack.☆57Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆39Updated last year
- Clipboard poisoning attack.☆58Updated 5 years ago
- Anubis 8.0 Android RAT☆100Updated 3 weeks ago
- Disable Windows:Defender,Firewall,SmartScreen with python file☆33Updated 4 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆40Updated 3 weeks ago
- control windows computeur from telegram☆68Updated last year
- 🔮 Python Remote administration tool via telegram☆52Updated 3 months ago