SaturnsVoid / Windows-BackdoorLinks
Simple Windows backdoor written in Go
☆25Updated 8 years ago
Alternatives and similar repositories for Windows-Backdoor
Users that are interested in Windows-Backdoor are comparing it to the libraries listed below
Sorting:
- This is the ToRat client, a part of the ToRat Project.☆26Updated 5 years ago
- Simple golang reverse shell☆21Updated 5 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Updated 7 years ago
- Shellcode process injector☆28Updated 5 years ago
- Go Advance Trojan Server For Windows Using Twitter As The C&C Server☆19Updated 8 years ago
- A Linux RAT in C☆35Updated 6 years ago
- Simple reverse and bind shells written in Go.☆32Updated 2 years ago
- Golang Implant & Post-Exploitation Framework☆59Updated 2 years ago
- ☆41Updated 7 years ago
- Tool aided persistence via Windows URI schemes abuse☆85Updated 5 years ago
- A Chrome cookie dumping utility☆46Updated 5 years ago
- rev shell and manager in go☆20Updated 5 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆42Updated 7 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆77Updated 5 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17Updated 7 years ago
- Golang ransomware☆46Updated 4 years ago
- Modular rootkit framework.☆29Updated 4 years ago
- Enumerates users based off RDP Screenshots☆34Updated last year
- Handy script to automate the attack☆21Updated 5 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- ☆50Updated 5 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆99Updated 2 years ago
- ☆66Updated 6 years ago
- Reverse shell for remote administration☆31Updated 7 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- I reworked the Go Windows Backdoor to use AES encryption.☆19Updated 8 years ago
- ☆31Updated 5 years ago
- recover Firefox and more browsers logins☆50Updated 3 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆71Updated 5 years ago