RAF-87 / win-back-cat
A fully undetected, hidden, persistent, reverse netcat shell backdoor for Windows.
☆20Updated 4 years ago
Alternatives and similar repositories for win-back-cat:
Users that are interested in win-back-cat are comparing it to the libraries listed below
- Disable Windows Defender All Version☆31Updated 4 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆37Updated 2 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆32Updated 5 years ago
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- Simple keylogger on C++ with several functions.☆17Updated 4 years ago
- Repository of tools used in my blog☆50Updated 11 months ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆40Updated 4 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆12Updated 2 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- Jok3r - Network and Web Pentest Framework☆17Updated 5 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- Tool to brute website sub-domains and dirs.☆47Updated 4 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Using bitsadmin to download our malware and to bypass defender☆27Updated 3 years ago
- Automated Penetration Testing☆14Updated 4 years ago
- ☆51Updated 4 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆15Updated 4 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Updated 7 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) Remote Adminstration Tools.☆21Updated 4 years ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆14Updated 4 years ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆27Updated 5 years ago
- Command and Control Framework☆13Updated 11 months ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 4 years ago