Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality
☆50Feb 12, 2023Updated 3 years ago
Alternatives and similar repositories for Persistent-Backdoor
Users that are interested in Persistent-Backdoor are comparing it to the libraries listed below
Sorting:
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated last month
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Jan 30, 2026Updated last month
- Protect your personal information from hackers and cyber criminals with HackAlert. Our product scans the internet for your online persona…☆18Oct 16, 2024Updated last year
- ☆38Apr 7, 2023Updated 2 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Reasonably undetected shellcode stager and executer.☆36May 23, 2025Updated 9 months ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Aug 11, 2024Updated last year
- Distributed phishing framework designed to streamline offensive security phishing☆41Feb 16, 2023Updated 3 years ago
- ☆37Feb 11, 2023Updated 3 years ago
- ☆28Mar 31, 2023Updated 2 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 2 months ago
- ☆20Mar 21, 2024Updated last year
- Still point in moving world.☆49Oct 6, 2022Updated 3 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆77Oct 24, 2022Updated 3 years ago
- Automate Scoping, OSINT and Recon assessments.☆112Feb 3, 2026Updated 3 weeks ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆91Jul 26, 2024Updated last year
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- Searches for employees of a company on linkedin, generates a list of possible emails and verifies them.☆48Sep 30, 2024Updated last year
- C++ Code to perform a MiniDump of lsass.exe☆36Aug 2, 2023Updated 2 years ago
- My Favorite Offensive Security Scripts☆84Apr 25, 2025Updated 10 months ago
- Free training course offered at Hack Space Con 2023☆138Apr 13, 2023Updated 2 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 2 years ago
- HARpwn - HARToken Extraction and Sanitization Module; HARpwn is a PowerShell module designed to streamline the extraction and sanitizati…☆20Nov 3, 2023Updated 2 years ago
- A simple pentest container equipped with common python pentest tools.☆42Jan 30, 2026Updated last month
- Remote persistent 🔑Logger for Windows and Linux☆295Apr 21, 2023Updated 2 years ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆66May 2, 2023Updated 2 years ago
- Winsocket for Cobalt Strike.☆102Jul 6, 2023Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Using fibers to run in-memory code.☆242Oct 19, 2023Updated 2 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆43Jun 27, 2023Updated 2 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Apr 4, 2023Updated 2 years ago
- Load a dynamic library from memory by modifying the native Windows loader☆285Jun 18, 2025Updated 8 months ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Jun 6, 2023Updated 2 years ago
- ☆23May 23, 2024Updated last year
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- ☆10Jun 11, 2022Updated 3 years ago