I reworked the Go Windows Backdoor to use AES encryption.
☆18Jul 19, 2017Updated 8 years ago
Alternatives and similar repositories for Windows-Backdoor-AES
Users that are interested in Windows-Backdoor-AES are comparing it to the libraries listed below
Sorting:
- Empire (https://github.com/EmpireProject/Empire) dockerized☆10Sep 17, 2018Updated 7 years ago
- Easy installers for Maru OS.☆12May 19, 2019Updated 6 years ago
- ☆12Nov 24, 2016Updated 9 years ago
- Cowrie SSH/Telnet Honeypot☆12Sep 3, 2018Updated 7 years ago
- Proof of concept tool used for phishing multi-factor authentication on O365☆14Aug 8, 2018Updated 7 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Golang AES Reader Writer Struct☆17Jan 30, 2018Updated 8 years ago
- JSON API for ExploitDB Website☆17Jan 11, 2015Updated 11 years ago
- Simple Windows backdoor written in Go☆24Jun 13, 2017Updated 8 years ago
- ☆20Jul 29, 2016Updated 9 years ago
- documentation and notes on how to rebase PM on CyanogenMod☆16Oct 20, 2016Updated 9 years ago
- Go Advance Trojan Server For Windows Using Twitter As The C&C Server☆17Mar 13, 2017Updated 8 years ago
- Social Engineering Abusing Google App Scripts☆24Jan 13, 2026Updated last month
- 3.10 kernel for Bacon running CM☆18May 27, 2017Updated 8 years ago
- Simple Netcat tool written in Go☆23Jun 3, 2023Updated 2 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- This bot allows you to automate the download process from a page where links to download files are periodically added☆10Dec 16, 2019Updated 6 years ago
- How to create stickers and files for creating stickers☆32Dec 31, 2023Updated 2 years ago
- Wrappers around smbclient and winexe with PTH support☆33Feb 23, 2016Updated 10 years ago
- Babel-Shellfish deobfuscates and scans Powershell scripts on real-time right before each line execution.☆43Nov 10, 2018Updated 7 years ago
- ☆38Aug 22, 2018Updated 7 years ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- monerobux modules for sopel irc bot☆11Aug 24, 2021Updated 4 years ago
- streamlink-cam4 lets you follow and archive your selected models shows on www.cam4.com☆12Sep 18, 2021Updated 4 years ago
- Python scripts for easy and anonymous cam4 recordings.☆10Mar 18, 2024Updated last year
- mp4 video download from Vimeo and DailyMotion☆10Apr 4, 2017Updated 8 years ago
- Simple Keylogger with smtp to send emails on your account using python works on linux and Windows☆36Dec 3, 2019Updated 6 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Aug 12, 2014Updated 11 years ago
- privacy guard-driven superuser access☆37Oct 26, 2016Updated 9 years ago
- Proof of Concept - Using squid url rewrite feature to "hijack" proxy traffic and inject BeEF payload into it.☆13Feb 23, 2015Updated 11 years ago
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 9 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- BypassAV无net添加windows用户