AiGptCode / ANYDESK-BACKDOOR
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increase the security of the open sourcecode.
☆73Updated last week
Alternatives and similar repositories for ANYDESK-BACKDOOR
Users that are interested in ANYDESK-BACKDOOR are comparing it to the libraries listed below
Sorting:
- GENERATE PYTHON BASED FUD STUB☆19Updated last year
- Simple Powershell Http shell With WEB UI☆70Updated last month
- POC | Steal user WhatsApp information/data☆54Updated this week
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆36Updated last year
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated last year
- A simple script to obfuscate batch(bat) code easily☆24Updated last year
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- POC Pdf-exploit builder on C#☆135Updated last year
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆33Updated this week
- (Beta) RES0LUTI0N is a malware builder undetected by Windows Defender with an anti-VM coded in python and C#. It uses a triple layer rand…☆47Updated last year
- Here are +200 different rats some with source code☆95Updated last year
- This Discord Rat give you the best way to control victims pc on discord.☆15Updated 4 months ago
- RAR-NextgenerationAI-expliot (use ai and more new techniques)☆14Updated last week
- Anti-forensics tool Inspired by NSA's Marble framework.☆9Updated 3 weeks ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆130Updated 2 years ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆34Updated 10 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆60Updated 3 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆38Updated 7 months ago
- ☆20Updated 2 years ago
- Fud Crypter & Downloader☆23Updated last year
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆174Updated 9 months ago
- ⚡ Scan World FTP Servers and Steal Their Data 🌍☆39Updated 3 months ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆105Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- Free and open source information stealer written in Go☆29Updated 5 months ago
- Hacking with PasteJacking technique☆22Updated 10 months ago
- Spearphishing tools, generate masqueraded pocket executable☆98Updated 2 years ago
- Tool to evade Antivirus With Different Techniques☆182Updated last year
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆33Updated last year