Kripto-Sec / CbackdoorLinks
Malware feito em C com algumas funções "extras" como um keylogger
☆18Updated 4 years ago
Alternatives and similar repositories for Cbackdoor
Users that are interested in Cbackdoor are comparing it to the libraries listed below
Sorting:
- Painel de consulta☆44Updated 4 years ago
- Painel de consultas completas de código aberto☆20Updated 4 years ago
- XerXes - Most powerful dos tool bY mR.Thg☆189Updated 2 years ago
- Um painel de consultas simples feito 100% em python.☆15Updated 2 years ago
- An full HTTP server for Phishing. Downloads recursively the entire webpage.☆138Updated 5 years ago
- Script feito em python que lista cameras ips expostas na internet☆10Updated 5 years ago
- ☆49Updated 7 years ago
- painel de consulta☆186Updated 3 months ago
- Samples Phishing tools made for Linux it contains 30 different type of Phishing Pages made with flask☆106Updated 4 years ago
- A-Rat ( Remote Administration Tools ) Based Reverse Shell Coded By ./Xi4u7 Use 'help' To Tutorial :)☆241Updated 2 years ago
- PowerFull Administration Tool For Linux☆192Updated 8 years ago
- This is Jester ransomware like, in Mr Robot movie (coded by Darlene S1E2,3), Please beware warning, after start you can't recover the fil…☆406Updated 5 years ago
- ☆259Updated 5 years ago
- Automated Payload Generator Tool☆111Updated 5 years ago
- The DoS tool created by Th3j35t3r, considered one of the most powerful tools since it's creation, leaked by Lulzsec.☆61Updated 7 years ago
- The linux choice collection tools☆67Updated 7 years ago
- Quack Toolkit is a set of tools to provide denial of service attacks. Quack Toolkit includes SMS attack tool, HTTP attack tool and many o…☆67Updated 5 years ago
- Undetectable helps you to generate fully undetectable payload of metasploit which can bypass android antivirus.☆111Updated 2 years ago
- ☆20Updated 4 years ago
- ☆236Updated 3 years ago
- An easy tool to generate backdoor with msfvenom (a part from metasploit framework). This tool compiles a malware with popular payload and…☆134Updated 9 years ago
- Hash cracker with auto detect hash☆253Updated 3 months ago
- Simple Remote Access Trojan Tool☆232Updated 3 years ago
- ☆373Updated 5 years ago
- Capturing audio (.wav) from target using a link☆97Updated last year
- Android+Windows Rat + Fud payload☆216Updated 3 years ago
- Painel de Consultas☆16Updated 3 years ago
- Burn Byte is a modern and powerful DDOS Toolkit☆36Updated 4 years ago
- ☆327Updated 4 years ago
- Shellphish is created by TheLinuxChoice but after the repository deleted we recreate this. To know how to use shellphish visit our websit…☆98Updated 5 years ago