S12cybersecurity / Infinite-Backdoors
Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions
☆11Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Infinite-Backdoors
- Pentesting Tools to Automatize Active Directory Hacking☆14Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Updated last year
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 2 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Updated 2 years ago
- Automate Blind SQL Injection with Python.☆20Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆7Updated 2 years ago
- Burp suite Certificate modification tool☆17Updated last year
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆37Updated 2 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆20Updated 7 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆11Updated last year
- Spider or repeater to find all links.☆13Updated 3 years ago
- Another vulnerability scanner☆17Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆20Updated 3 months ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 3 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 6 months ago
- Automate All Pivoting System Enumeration with this Bash Script☆11Updated 2 years ago
- Enumeration & fingerprint tool☆23Updated 8 months ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 2 months ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 3 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- ☆21Updated last year
- A Hacking and Pentesting Tool for Windows☆18Updated 6 months ago
- ExplorerUACStealer it's a malware that steal credentials provided by users in UAC Auth in explorer using API Hooking with Detours in C++…☆14Updated last year