You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increase the security of the open sourcecode.
☆98May 5, 2025Updated 10 months ago
Alternatives and similar repositories for ANYDESK-BACKDOOR
Users that are interested in ANYDESK-BACKDOOR are comparing it to the libraries listed below
Sorting:
- retrieve comprehensive information about a website, including its title, last modified date, DNS information, subdomains, firewall names,…☆16Mar 24, 2024Updated last year
- This code implements an Advanced Prompt Hacking Tester, which allows users to test the responses of an AI system by generating various ty…☆12Apr 14, 2024Updated last year
- CVE-2024-6387 with auto ip scanner and auto expliot☆11Jul 4, 2024Updated last year
- RAR-NextgenerationAI-expliot (use ai and more new techniques)☆21May 5, 2025Updated 10 months ago
- This is a Telegram bot that can download audio from YouTube videos and summarize the content using OpenAI's GPT-3 engine. It's a handy to…☆22Apr 14, 2024Updated last year
- Simple script to bulk check if IPs match networks☆11Jan 11, 2022Updated 4 years ago
- A simple Meterpreter stager written in Rust.☆45Nov 2, 2025Updated 4 months ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- GENERATE PYTHON BASED FUD STUB☆19Nov 20, 2023Updated 2 years ago
- Simple Ransoware to attack Windows 🌟☆25Apr 19, 2023Updated 2 years ago
- Lurker is a cross-platform, companion implant to Cobalt Strike built with Go☆33Mar 13, 2026Updated last week
- exploit-X Create Android Ransomware In Termux (NO ROOT). This Tool automate task of create the android ransomware apk with encryption key…☆29Oct 16, 2025Updated 5 months ago
- i will crack some random softwares & post that as Frida script, so that you wont worry about malware/spyware.☆29Dec 6, 2025Updated 3 months ago
- This project implements a cybersecurity system for detecting anomalies and intrusions in network traffic. It utilizes machine learning mo…☆15Mar 27, 2024Updated last year
- ☆18Dec 9, 2023Updated 2 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template☆29Dec 7, 2025Updated 3 months ago
- ☆23Jun 22, 2025Updated 8 months ago
- Webdav Mass Exploiter With Python Programming Language☆13Jul 19, 2025Updated 8 months ago
- Web Scanner Tool☆24Mar 13, 2024Updated 2 years ago
- ☆52Apr 1, 2022Updated 3 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆87May 5, 2023Updated 2 years ago
- 🕷️MITMProxy + Ettercap = PWNd☆11Dec 5, 2018Updated 7 years ago
- A ransomware written in python for Windows☆13Aug 10, 2022Updated 3 years ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆11Jul 14, 2023Updated 2 years ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆18Apr 17, 2024Updated last year
- Windows Disk Cleanup with Hidden Options☆19Sep 28, 2024Updated last year
- This code is a web scanner tool designed to find vulnerabilities and file upload points on a website. It uses various techniques to bypas…☆20May 4, 2025Updated 10 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆102Jun 16, 2024Updated last year
- A simple trojan made for Windows in Python.☆11Feb 8, 2025Updated last year
- Gradio + Coqui-ai☆17Nov 25, 2023Updated 2 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Sep 6, 2019Updated 6 years ago
- # D-TECT D-TECT - Pentest the Modern Web Author: [Shawar Khan] (https://shawarkhan.com/about/) Disclaimer: I am not responsible for any…☆36Jan 11, 2019Updated 7 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Mar 8, 2023Updated 3 years ago
- Vaccinating against WannaCry ransomware: a free tool by Minerva's research team☆24May 15, 2017Updated 8 years ago
- A tool for reverse engineering Android apk files☆13Nov 30, 2018Updated 7 years ago
- 📝 This makes it easy to install any number of apk files on your Android device, With one click you can easily install all the apk files …☆14Jan 22, 2021Updated 5 years ago
- A script to automatically generate TWRP-compatible device tree from a boot/recovery image☆10Apr 10, 2021Updated 4 years ago
- ddos-checker is a tool used to perform a test on a website from a DDOS attack to find security gaps in a website.☆12Oct 16, 2025Updated 5 months ago