AiGptCode / ANYDESK-BACKDOORLinks
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increase the security of the open sourcecode.
☆96Updated 9 months ago
Alternatives and similar repositories for ANYDESK-BACKDOOR
Users that are interested in ANYDESK-BACKDOOR are comparing it to the libraries listed below
Sorting:
- Here are +200 different rats some with source code☆150Updated 2 years ago
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆56Updated last year
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆189Updated last year
- Spearphishing tools, generate masqueraded pocket executable☆107Updated 2 years ago
- POC | Steal user WhatsApp information/data☆75Updated 9 months ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆79Updated 2 years ago
- 🔮 Python Remote administration tool via telegram☆55Updated 9 months ago
- Simple Powershell Http shell With WEB UI☆74Updated 10 months ago
- Perfect scripts for all the hustle we have with mass-mailing☆124Updated 5 months ago
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆39Updated 2 years ago
- 🦎Triton_RAT is free and easy to use, one of the best remote administration tools written in Python, fully integrated with Telegram🦎☆81Updated last month
- control windows computeur from telegram☆67Updated 2 years ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆137Updated 9 months ago
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆56Updated 4 months ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆112Updated 4 months ago
- SMTP Heist (SMTP Cracker) - Advanced Built with PyQt6 UI - Report to Telegram☆37Updated 4 months ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Updated 2 years ago
- Tool to evade Antivirus With Different Techniques☆192Updated 2 years ago
- Clipboard poisoning attack.☆59Updated 5 years ago
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆43Updated 4 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆79Updated last year
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆102Updated 2 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated 2 years ago
- ⚡ Scan World FTP Servers and get Their Data 🌍☆62Updated last month
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆69Updated 4 years ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆42Updated last year
- Social Engineering Browser Update Attack.☆59Updated 2 years ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆28Updated 2 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆64Updated last year