RAF-87 / win-back-cat
A fully undetected, hidden, persistent, reverse netcat shell backdoor for Windows.
☆20Updated 4 years ago
Alternatives and similar repositories for win-back-cat:
Users that are interested in win-back-cat are comparing it to the libraries listed below
- Repository of tools used in my blog☆50Updated 10 months ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Simple keylogger on C++ with several functions.☆16Updated 4 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- 🔅 Reverse shell written on python3☆15Updated 4 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆37Updated 2 years ago
- A reverse TCP payload and listener both written in python3.☆30Updated 7 months ago
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- Spider or repeater to find all links.☆13Updated 3 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- pure python remote adb scanner + nmap scan module☆21Updated 6 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆49Updated 3 years ago
- Disable Windows Defender All Version☆31Updated 4 years ago
- Persistent & Undetectable Malware Backdoor☆28Updated 8 months ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆12Updated 2 years ago
- A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.☆13Updated last year
- Fateh-Framework is a simple C2 (Command & Control) tool that attacking windows/Linux machines.☆14Updated 7 months ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆14Updated 3 years ago
- Using bitsadmin to download our malware and to bypass defender☆27Updated 3 years ago
- Automated Penetration Testing☆14Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 4 years ago
- Javascript Botnet☆23Updated 6 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- ./kumasia php simple backdoor☆22Updated 3 years ago
- ☆51Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Python script that automate the process of generating various reverse shells.☆16Updated 3 years ago
- Automating the SQL Injection through Google dorks.☆24Updated 2 years ago