IMcPwn / browser-backdoor
BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener
☆342Updated 2 years ago
Alternatives and similar repositories for browser-backdoor:
Users that are interested in browser-backdoor are comparing it to the libraries listed below
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆323Updated 7 years ago
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malic…☆507Updated 8 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆261Updated 7 years ago
- A webshell framework for penetration testers.☆296Updated 10 months ago
- A web front-end for password cracking and analytics☆623Updated 3 years ago
- Metasploit AV Evasion Tool☆259Updated 9 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆436Updated 7 years ago
- ☆339Updated 8 years ago
- Fancy Bear Source Code☆260Updated 8 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175Updated 8 years ago
- This repository contains some bettercap transparent proxy example modules.☆282Updated 6 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Updated 8 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆355Updated 2 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆496Updated 5 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆141Updated 7 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆407Updated 8 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆222Updated 6 years ago
- powerful auto-backdooring utility☆744Updated 7 years ago
- Your interpreter isn’t safe anymore — The PHP module backdoor☆221Updated 5 years ago
- Specify targets and run sets of tools against them☆388Updated 5 years ago
- Advanced Web Shell☆573Updated 7 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 8 years ago
- BlackNurse attack PoC☆171Updated 8 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆353Updated 6 years ago
- Various PoCs☆490Updated 5 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆608Updated 6 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆600Updated 3 years ago
- Windows Remote Post Breach Tool via Telegram☆132Updated 6 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆521Updated 7 years ago
- Powershell VNC injector☆333Updated 4 years ago