IMcPwn / browser-backdoorLinks
BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener
☆344Updated 2 years ago
Alternatives and similar repositories for browser-backdoor
Users that are interested in browser-backdoor are comparing it to the libraries listed below
Sorting:
- A webshell framework for penetration testers.☆298Updated last year
- ☆338Updated 8 years ago
- This repository contains some bettercap transparent proxy example modules.☆283Updated 7 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆174Updated 9 years ago
- Cartero - Social Engineering Framework☆170Updated 5 years ago
- Recon, Subdomain Bruting, Zone Transfers☆230Updated 8 years ago
- Metasploit AV Evasion Tool☆260Updated 9 years ago
- A web front-end for password cracking and analytics☆624Updated 3 years ago
- [unmaintained] Post-exploitation tool☆183Updated 9 years ago
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malic…☆512Updated 8 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆260Updated 7 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆407Updated 8 years ago
- Various PoCs☆491Updated 5 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆355Updated 2 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 7 years ago
- Fancy Bear Source Code☆261Updated 8 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆325Updated 8 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆353Updated 6 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆364Updated 10 years ago
- Advanced Web Shell☆575Updated 8 years ago
- EternalRocks worm☆460Updated 8 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆312Updated 8 years ago
- ☆129Updated 10 years ago
- A stealthy Python based Windows backdoor that uses Github as a command and control server☆264Updated 7 years ago
- Windows Remote Post Breach Tool via Telegram☆133Updated 7 years ago
- Specify targets and run sets of tools against them☆389Updated 6 years ago
- Exploits and Security Tools Framework 2.0.1☆306Updated 2 years ago
- Universal MITM web server☆108Updated 8 years ago
- Blaze Telegram Backdoor Toolkit is a post-exploitation tool that leverages the infrastructure of Telegram as a C&C☆202Updated 6 years ago
- Powershell VNC injector☆338Updated 4 years ago