Dash rootkit. Linux Trojan Backdoor. (MALWARE)
☆12Apr 3, 2023Updated 3 years ago
Alternatives and similar repositories for dash-shell-rootkit
Users that are interested in dash-shell-rootkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- eps(EasyProxyServeer),支持http、socket4、socket5的代理服务器☆10Aug 2, 2020Updated 5 years ago
- A remote desktop control suite☆16Jun 28, 2014Updated 11 years ago
- Android Remote Access Trojan Binder☆15Jun 27, 2025Updated 9 months ago
- This is an IP Puller for the game VRChat join discord for updates and support☆18Feb 16, 2026Updated last month
- Pentester's toolbox☆12Apr 3, 2026Updated last week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Issues to consider when planning a red team exercise.☆14Aug 23, 2017Updated 8 years ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- A simple unofficial Python3 library to interface with elevenlabs.io.☆17Nov 12, 2023Updated 2 years ago
- The tool was created to assist with fuzzing and exploiting stack-based buffer overflows☆10Dec 29, 2020Updated 5 years ago
- persistent windows backdoor with reverse shell☆27May 22, 2020Updated 5 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 4 years ago
- ☆11Aug 26, 2024Updated last year
- Simple ransomware to troll your friends. Encrypt and Decrypt a Windows computer using a simple xor encryption which is pretty basic!☆33Jan 10, 2021Updated 5 years ago
- Digital forensics for Google Drive—done right. Identify, preserve, and document cloud evidence with hash verification, timeline reconstru…☆26Dec 8, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- An open-source self-hosted purple team management web application.☆27Dec 10, 2025Updated 4 months ago
- ☆15Jun 5, 2024Updated last year
- Listen to radio & podcasts☆37Updated this week
- Preact Admin Dasboard Boilerplate☆25Oct 1, 2016Updated 9 years ago
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated 2 years ago
- Remotely collect linux live forensics artifacts.☆14Jul 8, 2022Updated 3 years ago
- SysWhispers & HellsGate Successor, fully modular Indirect & Direct Syscall Framework - EDR/AV/AC Capability Platform☆41Mar 1, 2026Updated last month
- This tool is a plugin based version checker for .NET obfuscators.☆12Jun 13, 2016Updated 9 years ago
- ReconXplorer is an all-in-one tool for OSINT, Discord automation, and server management. It offers IP and email info, Discord token tools…☆40Jan 9, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- DotRat is a Telegram Rat which includes good features and non privileged persistence. Written in C#☆12Aug 14, 2023Updated 2 years ago
- IP kung-FU☆10Mar 14, 2019Updated 7 years ago
- ☆10Aug 20, 2019Updated 6 years ago
- Simple Tool for webhacking☆12Apr 4, 2023Updated 3 years ago
- Subdomain enumeration tool, asynchronous dns packets, use pcap to scan 1600,000 subdomains in 1 second修复内存溢出等bug☆15Nov 25, 2023Updated 2 years ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆10Jul 29, 2019Updated 6 years ago
- Fully obfuscated trojan generator for windows.☆10Jul 3, 2019Updated 6 years ago
- C/C++ code obfuscator. Convert your code to a real one.☆12Sep 24, 2023Updated 2 years ago
- obfuscate your c++ code with an external text file!☆10Nov 19, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A platform independent C++ code obfuscator.☆13Jul 20, 2019Updated 6 years ago
- ☆25Mar 3, 2022Updated 4 years ago
- A small to find Host Header Injection vulnerabilities in a websites☆12Nov 21, 2022Updated 3 years ago
- Distributed Multi-INT Fusion Center designed for decentralized situational awareness.☆76Updated this week
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- SQL Injection attack is the most common website hacking technique. Most websites use Structured Query Language (SQL) to interact with dat…☆12Jul 16, 2022Updated 3 years ago
- Linux Remote Access Trojan (RAT)☆40Oct 7, 2016Updated 9 years ago