Hide your payload into .jpg file
☆396Dec 23, 2021Updated 4 years ago
Alternatives and similar repositories for ImgBackdoor
Users that are interested in ImgBackdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Dec 2, 2020Updated 5 years ago
- Image Payload Creating/Injecting tools☆1,291Nov 30, 2023Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Python AV Evasion Tools☆517Oct 14, 2025Updated 6 months ago
- Windows Encrypt/Decrypt using AES 256 bit keys☆13Dec 25, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An Python Script For Generating Payloads that Bypasses All Antivirus so far .☆1,001Jan 19, 2024Updated 2 years ago
- PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.☆326Nov 2, 2024Updated last year
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 5 years ago
- Backstage Parser☆33Jun 23, 2022Updated 3 years ago
- THorse is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python 3.☆606Dec 2, 2023Updated 2 years ago
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆938May 28, 2025Updated 10 months ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆94May 15, 2021Updated 4 years ago
- ⛤Keylogger Generator for Windows written in Python⛤☆55Jun 9, 2023Updated 2 years ago
- A simple shell code encryptor/decryptor/executor to bypass anti virus.☆469Dec 13, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Assist reverse tcp shells in post-exploration tasks☆222Oct 17, 2025Updated 6 months ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆13Aug 31, 2019Updated 6 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated 3 months ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Nov 12, 2021Updated 4 years ago
- ParadoxiaRat : Native Windows Remote access Tool.☆822Apr 18, 2023Updated 3 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆142Oct 3, 2023Updated 2 years ago
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,453May 6, 2024Updated last year
- Python network worm that spreads on the local network and gives the attacker control of these machines.☆531Oct 5, 2022Updated 3 years ago
- A Python based RAT 🐀 (Remote Access Trojan) for getting reverse shell 🖥️☆921Dec 9, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- C2 Powershell Command & Control Framework with BuiltIn Commands☆506Mar 11, 2024Updated 2 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Eficaz herramienta capaz de inyectar un backdoor a casi cualquier app Android actual☆40Oct 26, 2020Updated 5 years ago
- Small and convenient C2 tool for Windows targets☆615Mar 8, 2022Updated 4 years ago
- simple code directory brute☆17Feb 26, 2021Updated 5 years ago
- a shell script aim to automatically launch 50+ online web scanning tools in the Browsaer against a target domain in a 10 waves☆66Sep 19, 2019Updated 6 years ago
- Injects php payloads into jpeg images☆542Nov 28, 2020Updated 5 years ago
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆190May 5, 2025Updated 11 months ago
- Network Scanner with Backdoor Detection, other Nmap resources and syn-protection detection☆32Jul 31, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Jul 6, 2024Updated last year
- Web Vulnerability Scanner using Shell Script☆60Jun 29, 2022Updated 3 years ago
- #xss #xssfinder #xss-scanner #bugbounty #hacktool☆35Jan 7, 2024Updated 2 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Dec 6, 2023Updated 2 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Feb 11, 2021Updated 5 years ago
- Simple script masks the phishing link under the normal URL☆89Feb 1, 2021Updated 5 years ago
- PwnXSS: Vulnerability (XSS) scanner exploit☆815Dec 30, 2022Updated 3 years ago