EiSiMo / BackdoorLinks
A backdoor that runs on Linux and Windows
☆48Updated last year
Alternatives and similar repositories for Backdoor
Users that are interested in Backdoor are comparing it to the libraries listed below
Sorting:
- Fud Persistent Windows Backdoor developed purely in python☆29Updated 4 years ago
- $2100 .Exe to .Doc Exploit (Python)☆53Updated 4 years ago
- ☄ 📏☣✒Blue Eagle jRAT is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT] [Linux RAT] [MAC RAT] } which is fully p…☆1Updated 2 years ago
- njRAT C# Stub - Fixed For PowerShell☆55Updated 5 years ago
- cross-platform C2 framework in python 2☆41Updated 3 years ago
- Fully Undetectable Native C++ Remote Access Agent / Botnet.☆89Updated 5 years ago
- Using bitsadmin to download our malware and to bypass defender☆27Updated 4 years ago
- A C2 project that controls a self-propagating MS17-010 worm.☆72Updated 4 years ago
- Revenge-RAT C# Stub - Fixed☆93Updated 5 years ago
- A Free PHP Interface with VB.NET based Stub and Builder BotNET☆22Updated 6 years ago
- boilerplate python rat☆111Updated 4 years ago
- Escalation / Bypass Windows UAC☆111Updated 5 years ago
- Simple keylogger on C++ with several functions.☆17Updated 5 years ago
- Grab cookies from Firefox, Chrome, Opera using a shortcut file☆43Updated 5 years ago
- Crypter For Malware and Stealer☆34Updated 5 years ago
- Crypter made in C#. Nearly FUD. Detection rate 2/38☆51Updated 2 weeks ago
- Create a powershell malware loader to run C#.cs code on runtime☆64Updated 5 years ago
- Download a payload and make it run from registry without droppng.☆107Updated 6 years ago
- Simple HTTP Pull Botnet with a very cool Web Based C&C Panel☆42Updated 4 years ago
- The malware is un-killable and fully undetectable by antivirus, developed by Kingsman. It steals the browser passwords, Discord Tokens & …☆58Updated 3 years ago
- Python based Remote Administration Tool(RAT)☆92Updated 5 years ago
- Download a .NET payload and run it on memory☆69Updated 6 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆98Updated 4 years ago
- using VBS to download and install a powershell malware☆41Updated 5 years ago
- Source code of Claw Key logger previously sold on HackForums☆56Updated 2 years ago
- Simple example of how to remove all malwares from disk and registry.☆41Updated 6 years ago
- JS Jscript - download file from url then run it☆60Updated 5 years ago
- blackhole is a ransomware coded in c#☆27Updated 5 years ago
- Simple Malware Downloader☆124Updated 6 years ago
- Reverse shell written on python3☆61Updated 4 years ago