SafeBreach-Labs / backdoros
backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL etc.
☆67Updated 5 years ago
Alternatives and similar repositories for backdoros:
Users that are interested in backdoros are comparing it to the libraries listed below
- ☆36Updated 6 years ago
- Executables that execute other stuff☆52Updated 6 years ago
- ☆11Updated 2 years ago
- Exfiltration based on custom X509 certificates☆26Updated 11 months ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 5 years ago
- Event Data Collector☆36Updated 7 months ago
- DNS File EXfiltration☆46Updated 10 months ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆72Updated 8 years ago
- ☆23Updated 4 years ago
- Collection of IronPython scripts and executables for penetration testing☆55Updated 5 years ago
- BlueKeep powershell scanner (based on c# code)☆38Updated 5 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- Pypykatz agent implemented in .NET☆86Updated 5 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 5 years ago
- ☆30Updated 5 years ago
- In motherland, target network calls you!☆59Updated 6 years ago
- Apfell Golang macOS/Linux/Windows implant☆88Updated 3 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated 7 months ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- Password spraying on sites that require 2+ page loads and dynamic nonces☆30Updated 5 years ago
- Targeted Payload Execution☆98Updated 4 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Updated last year
- Scan for and exploit Consul agents☆40Updated 5 years ago
- ☆109Updated 6 years ago
- ☆60Updated 4 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆85Updated 3 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- A CLI tool for querying passive DNS services☆41Updated last year