AiGptCode / ANYDESK-BACKDOORLinks
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increase the security of the open sourcecode.
☆85Updated 5 months ago
Alternatives and similar repositories for ANYDESK-BACKDOOR
Users that are interested in ANYDESK-BACKDOOR are comparing it to the libraries listed below
Sorting:
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆185Updated last year
- Here are +200 different rats some with source code☆120Updated 2 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated last year
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆45Updated last year
- POC | Steal user WhatsApp information/data☆74Updated 4 months ago
- ⚡ Scan World FTP Servers and Steal Their Data 🌍☆50Updated 8 months ago
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆38Updated last year
- 🔮 Python Remote administration tool via telegram☆54Updated 5 months ago
- Spearphishing tools, generate masqueraded pocket executable☆105Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆121Updated 2 years ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆109Updated 3 weeks ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆141Updated 3 years ago
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆42Updated last week
- control windows computeur from telegram☆68Updated 2 years ago
- Simple Powershell Http shell With WEB UI☆72Updated 6 months ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated last year
- Social Engineering Browser Update Attack.☆55Updated last year
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆52Updated 11 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆64Updated 4 years ago
- Boost website hits by generating requests from multiple proxy IPs.☆75Updated last year
- 🦎Triton_RAT is free and easy to use, one of the best remote administration tools written in Python, fully integrated with Telegram🦎☆63Updated last month
- Clipboard poisoning attack.☆58Updated 5 years ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆37Updated last year
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆26Updated 2 years ago
- A simple script to obfuscate batch(bat) code easily☆26Updated last year
- This is a tool to obfuscate / to make your python code unreadable. It obfuscates your code and prevents easy access of others to your cod…☆43Updated 9 months ago
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆79Updated last year
- steal chrome saved passwords "undetectable"☆51Updated 3 years ago
- This Discord Rat give you the best way to control victims pc on discord.☆19Updated last month
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆89Updated 5 months ago