SaturnsVoid / Windows-BackdoorLinks
Simple Windows backdoor written in Go
☆24Updated 8 years ago
Alternatives and similar repositories for Windows-Backdoor
Users that are interested in Windows-Backdoor are comparing it to the libraries listed below
Sorting:
- This is the ToRat client, a part of the ToRat Project.☆25Updated 6 years ago
- Simple golang reverse shell☆20Updated 5 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Updated 8 years ago
- Tool aided persistence via Windows URI schemes abuse☆84Updated 5 years ago
- Modular rootkit framework.☆30Updated 4 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆42Updated 7 years ago
- Shellcode process injector☆28Updated 5 years ago
- rev shell and manager in go☆20Updated 5 years ago
- This is the ToRat server, a part of the ToRat Project.☆23Updated 6 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- Golang Implant & Post-Exploitation Framework☆59Updated 2 years ago
- Go Advance Trojan Server For Windows Using Twitter As The C&C Server☆17Updated 8 years ago
- DNS Botnet Server and Client☆34Updated 3 months ago
- ☆67Updated 7 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆98Updated 3 years ago
- A Linux RAT in C☆33Updated 7 years ago
- A simple python reverse shell written just for fun.☆63Updated 2 years ago
- A Chrome cookie dumping utility☆46Updated 5 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆73Updated 5 years ago
- Golang ransomware☆47Updated 5 years ago
- ☆40Updated 7 years ago
- ☆62Updated 3 years ago
- HTTPS-based Remote Administration Tool (RAT)☆29Updated 9 years ago
- A way to backdoor every process☆68Updated 8 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆24Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Updated 8 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago
- Quick and simple way to encrypt your code via OpenSSL with a key size of 16, 24 or 32 to protect your code from being seen☆16Updated 5 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆41Updated 7 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Updated 6 years ago