AiGptCode / ANYDESK-BACKDOOR
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increase the security of the open sourcecode.
☆68Updated 10 months ago
Alternatives and similar repositories for ANYDESK-BACKDOOR:
Users that are interested in ANYDESK-BACKDOOR are comparing it to the libraries listed below
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆37Updated last year
- Simple Powershell Http shell With WEB UI☆70Updated 2 months ago
- GENERATE PYTHON BASED FUD STUB☆20Updated last year
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆74Updated last year
- Spearphishing tools, generate masqueraded pocket executable☆94Updated last year
- ☆21Updated last year
- The africana-framework is a software designed for network & web hacking by automating as much stuff as possible to detect vulnerabilities…☆27Updated 2 months ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆102Updated last year
- A simple script to obfuscate batch(bat) code easily☆22Updated last year
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated last year
- Here are +200 different rats some with source code☆87Updated last year
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆29Updated 4 months ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆91Updated 3 months ago
- POC Pdf-exploit builder on C#☆129Updated 11 months ago
- ⚡ Scan World FTP Servers and Steal Their Data 🌍☆34Updated 2 weeks ago
- ☆96Updated 3 months ago
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- 🥊 ddos clustering☆45Updated last year
- Tool to evade Antivirus With Different Techniques☆168Updated last year
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆22Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆123Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆122Updated 2 years ago
- Social Engineering Browser Update Attack.☆56Updated last year
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆29Updated 10 months ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆31Updated 7 months ago
- (Beta) RES0LUTI0N is a malware builder undetected by Windows Defender with an anti-VM coded in python and C#. It uses a triple layer rand…☆47Updated 9 months ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆54Updated 5 months ago
- Free and open source information stealer written in Go☆22Updated last month
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆34Updated last year