Tsuyoken / MSBackdoor
[Discontinued] Transform your payload into fake powerpoint (.ppt)
☆40Updated 4 years ago
Alternatives and similar repositories for MSBackdoor:
Users that are interested in MSBackdoor are comparing it to the libraries listed below
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- ☆17Updated 5 years ago
- Simple keylogger on C++ with several functions.☆17Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- Disable Windows Defender All Version☆31Updated 4 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 7 months ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆14Updated 4 years ago
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspace☆27Updated 4 years ago
- Python script that automate the process of generating various reverse shells.☆16Updated 3 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆37Updated 2 years ago
- Mini Wordress Exploiter using CVE2020☆31Updated 4 years ago
- A reverse TCP payload and listener both written in python3.☆30Updated 9 months ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Updated 3 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆16Updated 4 years ago
- Using bitsadmin to download our malware and to bypass defender☆27Updated 3 years ago
- Simple RAT in C#☆25Updated 4 years ago
- Persistent & Undetectable Malware Backdoor☆29Updated 10 months ago
- ☆12Updated 2 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- Easy to understand back door written in python☆34Updated 2 years ago
- Reverse shell using Windows Registry files (.reg)☆18Updated 4 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- ./kumasia php simple backdoor☆22Updated 3 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆45Updated last year
- Fateh-Framework is a simple C2 (Command & Control) tool that attacking windows/Linux machines.☆14Updated 8 months ago
- Hacking Tools Z0172CK☆31Updated last year
- Windows Crypter/Decrypter Generator with AES 256 bits key☆28Updated 6 years ago
- An open-source .NET Ransomware☆24Updated 3 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago