SaturnsVoid / Windows-Backdoor
Simple Windows backdoor written in Go
☆24Updated 7 years ago
Alternatives and similar repositories for Windows-Backdoor:
Users that are interested in Windows-Backdoor are comparing it to the libraries listed below
- This is the ToRat client, a part of the ToRat Project.☆27Updated 5 years ago
- Simple golang reverse shell☆20Updated 5 years ago
- PoC Remote Administration Tool☆11Updated 5 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆28Updated 7 years ago
- Hack tools coded in golang☆20Updated last year
- Go Advance Trojan Server For Windows Using Twitter As The C&C Server☆19Updated 7 years ago
- This is the ToRat server, a part of the ToRat Project.☆23Updated 5 years ago
- Modular rootkit framework.☆27Updated 3 years ago
- Golang Implant & Post-Exploitation Framework☆59Updated last year
- Finding code caves in ELF files with GoLang☆26Updated 7 years ago
- Reverse shell and rootkit☆19Updated 7 years ago
- CVE-2020-0688☆10Updated 4 years ago
- Shellcode process injector☆27Updated 4 years ago
- extracts urls from text☆16Updated 6 years ago
- Sockstress (CVE-2008-4609) DDoS implementation written in Go☆17Updated 8 years ago
- I reworked the Go Windows Backdoor to use AES encryption.☆18Updated 7 years ago
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- A Chrome cookie dumping utility☆46Updated 5 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 6 years ago
- Golang ransomware☆44Updated 4 years ago
- BitBender is a byte manipulation tool☆12Updated 6 years ago
- A Linux RAT in C☆31Updated 6 years ago
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆45Updated last year
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 8 years ago
- CIDR to IP List Tool☆14Updated 8 years ago
- rev shell and manager in go☆20Updated 4 years ago
- sshd-poison is a tool that modifies a sshd binary to capture password-based authentications and allows you to login in some accounts usin…☆94Updated 4 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Updated 4 years ago
- ☆20Updated 6 years ago
- Modular C2 server to tame your pack of wolves☆12Updated last year