Tsuyoken / ImgBackdoor
Hide your payload into .jpg file
☆390Updated 3 years ago
Alternatives and similar repositories for ImgBackdoor:
Users that are interested in ImgBackdoor are comparing it to the libraries listed below
- Framework RapidPayload - Metasploit Payload Generator | Crypter FUD AntiVirus Evasion☆414Updated 3 years ago
- Sinister is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info☆453Updated 6 months ago
- KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detecti…☆358Updated last year
- THorse is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python 3.☆587Updated last year
- "Socialx" is a Social Engineering And Remote Access Trojan Tool. You can generate fud backdoor and you can embed any file you want inside…☆316Updated 3 years ago
- Ransom0 is a open source ransomware made with Python, designed to find and encrypt user data.☆350Updated 10 months ago
- A Python based RAT 🐀 (Remote Access Trojan) for getting reverse shell 🖥️☆783Updated last year
- Chrome Keylogger Extension | Post Exploitation Tool☆424Updated 2 years ago
- Modular penetration testing platform that enables you to write, test, and execute exploit code.☆302Updated 4 months ago
- PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.☆330Updated 5 months ago
- Arbitrium is a cross-platform, fully undetectable remote access trojan, to control Android, Windows and Linux and doesn't require any fir…☆347Updated 4 years ago
- Tool Information Gathering & social engineering Write By [Python,JS,PHP]☆504Updated last year
- C2 Powershell Command & Control Framework with BuiltIn Commands☆491Updated last year
- Advanced Android AV Evasion Tool Written In Python 3 that can Embed/Bind meterpreter APK to any Legitimate APK☆289Updated 10 months ago
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆459Updated 3 months ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆734Updated 4 years ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆246Updated 4 years ago
- Python steal chrome password all version browser are supported 100 % FUD☆285Updated 4 years ago
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆25Updated last year
- Remote Access Tool☆594Updated last year
- A backdoor with a multitude of features.☆280Updated 5 months ago
- RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model,…☆280Updated 3 years ago
- Hacking systems with the automation of PasteJacking attacks.☆395Updated 5 months ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆370Updated 2 years ago
- Python network worm that spreads on the local network and gives the attacker control of these machines.☆492Updated 2 years ago
- An Python Script For Generating Payloads that Bypasses All Antivirus so far .☆975Updated last year
- Lockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and…☆909Updated 3 years ago
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆177Updated 2 years ago
- Ransomwares Collection. Don't Run Them on Your Device.☆613Updated 5 months ago
- Python AV Evasion Tools☆504Updated 2 months ago