HalilDeniz / BackDoorSim
BackdoorSim: An Educational into Remote Administration Tools
☆103Updated last year
Alternatives and similar repositories for BackDoorSim:
Users that are interested in BackDoorSim are comparing it to the libraries listed below
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆104Updated last year
- Simple Powershell Http shell With WEB UI☆70Updated 3 weeks ago
- POC Pdf-exploit builder on C#☆133Updated last year
- PassBreaker☆60Updated last year
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆117Updated 10 months ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆74Updated 2 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆109Updated last year
- Kali Packerge Manager☆59Updated last year
- D3Ext's Forward Shell☆120Updated last year
- NetworkAssessment: Network Compromise Assessment Tool☆96Updated 10 months ago
- Here are +200 different rats some with source code☆93Updated last year
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆66Updated 2 years ago
- Boost website hits by generating requests from multiple proxy IPs.☆64Updated last year
- Wireless Intrusion Detection System for Hak5's WiFi Coconut☆31Updated 2 years ago
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆113Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- Reverse shell that can bypass windows defender detection☆164Updated last year
- Golang tool to help in forcing a license for HAK5 C2 Tool☆46Updated last year
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆78Updated 9 months ago
- The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.☆90Updated 2 years ago
- Gmail/GSuite account enumeration tool☆50Updated last year
- Mass bruteforce authentication of common services with common credentials.☆47Updated last year
- Nmap & SQL injection automation tool☆33Updated 6 months ago
- ☆132Updated 2 years ago
- Persistent Powershell backdoor tool {😈}☆117Updated 8 months ago
- An aggressor script that can help automate payload building in Cobalt Strike☆115Updated last year
- A fast subdomain takeover tool☆78Updated last year
- A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and …☆39Updated last year
- Huge Collection of Wordpress Exploits and CVES☆123Updated 2 years ago