A fully undetected, hidden, persistent, reverse netcat shell backdoor for Windows.
☆25Dec 4, 2020Updated 5 years ago
Alternatives and similar repositories for win-back-cat
Users that are interested in win-back-cat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CloudflaredRAT is a simple combination of popular open-source tools, wrapping a local-facing shell with Cloudflares Argo Tunnel in an exe…☆14Oct 30, 2020Updated 5 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- This project aims to create new tweets and carry out social engineering attacks by using the messages that people sent from social media …☆12Dec 16, 2017Updated 8 years ago
- Penetration Test Framwork☆21May 10, 2018Updated 7 years ago
- This version touches disk for registry persistence.☆27Oct 6, 2015Updated 10 years ago
- An opensource Prank Startup Malware for windows developed using C Programming Language.☆24Aug 10, 2020Updated 5 years ago
- CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability☆21Mar 8, 2022Updated 4 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Mar 16, 2026Updated last week
- A small collection of scripts that are useful for implementing Domain Fronting in an assessment.☆14Apr 25, 2019Updated 6 years ago
- Persistent & Undetectable Malware Backdoor☆28May 8, 2024Updated last year
- YesMan☆16Nov 8, 2023Updated 2 years ago
- ☆13Nov 29, 2024Updated last year
- persistent windows backdoor with reverse shell☆27May 22, 2020Updated 5 years ago
- Virtual host bruteforcer against given network range or single ip☆11Mar 21, 2019Updated 7 years ago
- A fork (and mirror) of the Buffer Overflow Module created by NSF Award No. 0113627☆11Feb 11, 2017Updated 9 years ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆19Jan 10, 2026Updated 2 months ago
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆14Aug 30, 2021Updated 4 years ago
- All combinations of various characters, to get the desired word☆21Dec 13, 2023Updated 2 years ago
- 用bat脚本在windows环境下,一键免杀shellcode☆28Mar 6, 2022Updated 4 years ago
- ☆14Jan 2, 2025Updated last year
- ☆11Apr 23, 2019Updated 6 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- Make a Digispark (or teensy) run a python script in the background on any "victim" windows computer you plug it into with python installe…☆18Mar 20, 2023Updated 3 years ago
- How to ARM Yourself - Bsides Tampa 2020☆14Mar 1, 2020Updated 6 years ago
- CVE-2023-2640 CVE-2023-32629☆13Aug 15, 2023Updated 2 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- ☆33Sep 21, 2024Updated last year
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- 🧾 | Use these AI prompts to refine your searches, improve accuracy, and get detailed, context-driven responses that precisely match your…☆22May 11, 2025Updated 10 months ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 10 months ago
- 挖掘src常用脚本☆15Nov 2, 2019Updated 6 years ago
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Mar 25, 2023Updated 2 years ago
- 💥 Implementation of zip bomb, using python script.☆12Dec 18, 2021Updated 4 years ago
- exploits.shodan.io's unofficial api no api-key needed☆16Apr 10, 2021Updated 4 years ago
- Comprehensive Cheat Sheet for Rapid7's Insight-IDR LEQL Search Language.☆11Mar 18, 2024Updated 2 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Aug 1, 2021Updated 4 years ago
- Mis proyectos de marketing aplicando AI☆11Oct 31, 2025Updated 4 months ago