A fully undetected, hidden, persistent, reverse netcat shell backdoor for Windows.
☆25Dec 4, 2020Updated 5 years ago
Alternatives and similar repositories for win-back-cat
Users that are interested in win-back-cat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CloudflaredRAT is a simple combination of popular open-source tools, wrapping a local-facing shell with Cloudflares Argo Tunnel in an exe…☆14Oct 30, 2020Updated 5 years ago
- Polymorphic ELF Virus☆18Mar 19, 2022Updated 4 years ago
- Fully undetected backdoor with RSA Encrypted shell☆11Jan 3, 2018Updated 8 years ago
- Just a better dirbuster☆13Dec 8, 2022Updated 3 years ago
- PoC exploit code for CVE-2021-26855☆17Mar 9, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20May 24, 2019Updated 6 years ago
- This project aims to create new tweets and carry out social engineering attacks by using the messages that people sent from social media …☆12Dec 16, 2017Updated 8 years ago
- This version touches disk for registry persistence.☆27Oct 6, 2015Updated 10 years ago
- An opensource Prank Startup Malware for windows developed using C Programming Language.☆24Aug 10, 2020Updated 5 years ago
- CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability☆21Mar 8, 2022Updated 4 years ago
- This is the reconnaissance script I wrote for my OSCP journey☆14Feb 20, 2018Updated 8 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Mar 16, 2026Updated 3 weeks ago
- Kali Linux Network Scanning Cookbook Second Edition, published by Packt☆17Dec 15, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A small collection of scripts that are useful for implementing Domain Fronting in an assessment.☆13Apr 25, 2019Updated 6 years ago
- Machine Learning Model to detect hidden malwares and phase changing malwares.It predicts the date of the next probable attack of the malw…☆13Apr 30, 2020Updated 5 years ago
- Persistent & Undetectable Malware Backdoor☆28May 8, 2024Updated last year
- ☆10Apr 2, 2022Updated 4 years ago
- YesMan☆17Nov 8, 2023Updated 2 years ago
- Virtual host bruteforcer against given network range or single ip☆11Mar 21, 2019Updated 7 years ago
- A fork (and mirror) of the Buffer Overflow Module created by NSF Award No. 0113627☆11Feb 11, 2017Updated 9 years ago
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆14Aug 30, 2021Updated 4 years ago
- ☆13May 9, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- All combinations of various characters, to get the desired word☆21Dec 13, 2023Updated 2 years ago
- ☆16Jun 21, 2024Updated last year
- 用bat脚本在windows环境下,一键免杀shellcode☆28Mar 6, 2022Updated 4 years ago
- ☆11Apr 23, 2019Updated 6 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Oct 13, 2021Updated 4 years ago
- How to ARM Yourself - Bsides Tampa 2020☆14Mar 1, 2020Updated 6 years ago
- CVE-2023-2640 CVE-2023-32629☆13Aug 15, 2023Updated 2 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆33Sep 21, 2024Updated last year
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Image encryption and embedding encrypted text in the image.☆24Dec 15, 2020Updated 5 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 10 months ago
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Mar 25, 2023Updated 3 years ago
- [ICLR 2026] Meta-RL Induces Exploration in Language Agents☆35Feb 1, 2026Updated 2 months ago
- 💥 Implementation of zip bomb, using python script.☆12Dec 18, 2021Updated 4 years ago