MartinxMax / skbdLinks
A tool that automates fileless SSH backdoor injection—bypassing CA checks, erasing logs, creating long‑lived (up to 9999 days) passwordless SSH users for persistent, stealthy access and enabling migration of compromised host data.
☆26Updated last week
Alternatives and similar repositories for skbd
Users that are interested in skbd are comparing it to the libraries listed below
Sorting:
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆177Updated last year
- Drana-Infinity is a locally hosted advanced AI assistant designed and developed by IHA089. It’s built specifically for cybersecurity, eth…☆160Updated last month
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆35Updated 2 months ago
- SilverTGOSINT is a Telegram OSINT tool that collects messages from target users in Telegram groups and tracks users who extract data from…☆49Updated 8 months ago
- AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effecti…☆48Updated 8 months ago
- ☆71Updated 2 years ago
- Nmap & SQL injection automation tool☆39Updated last year
- Admin Directory Finder is a tool designed to scan and identify directories under admin paths, such as admin/dashboard.php. It helps in se…☆33Updated 4 months ago
- Redirect All Traffic Through Tor Network For Kali Linux☆210Updated 10 months ago
- Python scripts and tools built during my learning journey☆31Updated 2 months ago
- X-snifer is a versatile tool designed for scanning and gathering information from a website and simplifying various website analysis and …☆82Updated 3 months ago
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆43Updated 3 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆100Updated 2 years ago
- POC | Steal user WhatsApp information/data☆75Updated 8 months ago
- Tyrant is a malicious tool used for penetration testing and remote control persistence.☆35Updated 11 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆145Updated last year
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Updated last year
- This is a exploit with the capability to control ip camera movement even without a username and password.☆76Updated 9 months ago
- Here are +200 different rats some with source code☆144Updated 2 years ago
- IoT Camera Reconnaissance and Live Viewer☆170Updated last year
- reverse shell, Bypass windows defender firewall☆45Updated last year
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆187Updated last year
- A comprehensive web application security testing toolkit that combines 10 powerful penetration testing features into one tool.☆45Updated 9 months ago
- DrShell is a cutting-edge tool designed for the dynamic management of reverse shell sessions. Whether you are a seasoned security profess…☆16Updated 5 months ago
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆111Updated 2 weeks ago
- A powerful OSINT (Open-Source Intelligence) tool for searching usernames across 50+ social media platforms, with AI-powered analysis and …☆19Updated 4 months ago
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆130Updated 3 months ago
- Metasploit-AI is a cutting-edge cybersecurity framework that combines the power of Metasploit with advanced artificial intelligence and m…☆26Updated 5 months ago
- DarkCool All Tools For Hacking Activity! List:~ Exploiter, Checker, Webshell Finder, Grabber, Searching, Bruteforce, Random, And Others T…☆171Updated last year
- Automated exploit scanner for cameras on the internet☆217Updated last year