AiGptCode / ANYDESK-BACKDOORLinks
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increase the security of the open sourcecode.
☆76Updated last month
Alternatives and similar repositories for ANYDESK-BACKDOOR
Users that are interested in ANYDESK-BACKDOOR are comparing it to the libraries listed below
Sorting:
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated last year
- Simple Powershell Http shell With WEB UI☆71Updated 2 months ago
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆37Updated this week
- Here are +200 different rats some with source code☆100Updated last year
- POC | Steal user WhatsApp information/data☆65Updated last month
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆107Updated last year
- 🦎Triton_RAT is free and easy to use, one of the best remote administration tools written in Python, fully integrated with Telegram🦎☆54Updated last week
- This Discord Rat give you the best way to control victims pc on discord.☆16Updated 6 months ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆177Updated 10 months ago
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆42Updated 8 months ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- GENERATE PYTHON BASED FUD STUB☆19Updated last year
- Generate FUD Droppers that are undetectable by popular AV's☆30Updated last year
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆36Updated last year
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆25Updated 2 years ago
- RAR-NextgenerationAI-expliot (use ai and more new techniques)☆14Updated last month
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆40Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆40Updated 9 months ago
- Persistent Powershell backdoor tool {😈}☆119Updated 10 months ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆35Updated 11 months ago
- Free advanced and modern Windows botnet with a nice and secure PHP panel developed using VB.NET.☆54Updated 4 years ago
- steal chrome saved passwords "undetectable"☆50Updated 3 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- control windows computeur from telegram☆67Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆61Updated 4 years ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆110Updated 2 years ago
- 🔮 Python Remote administration tool via telegram☆52Updated 2 months ago
- ⚡ Scan World FTP Servers and Steal Their Data 🌍☆41Updated 4 months ago