Tsuyoken / MSBackdoor
[Discontinued] Transform your payload into fake powerpoint (.ppt)
☆40Updated 4 years ago
Alternatives and similar repositories for MSBackdoor:
Users that are interested in MSBackdoor are comparing it to the libraries listed below
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- ☆17Updated 5 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆37Updated 2 years ago
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspace☆27Updated 4 years ago
- Using bitsadmin to download our malware and to bypass defender☆27Updated 3 years ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆14Updated 3 years ago
- Onionnux is a onionsite(DEEPNET/DARKNET) tool.It can help to idenitfy onionsite is active or onionsite server name.☆17Updated 3 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- TORAPF is a Tor Network Admin Page Finder Tool.It can help to get admin page from tor network.☆12Updated 4 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- Disable Windows Defender All Version☆31Updated 4 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆16Updated 4 years ago
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆55Updated 2 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Updated 3 years ago
- Python script that automate the process of generating various reverse shells.☆16Updated 3 years ago
- Python Script to Crack Zip Password with Dictionary attack and also use Crunch as Pipeline☆38Updated 6 years ago
- A reverse TCP payload and listener both written in python3.☆30Updated 8 months ago
- Simple keylogger on C++ with several functions.☆16Updated 4 years ago
- Wi-Fi Exploit Tool☆53Updated 4 years ago
- Simple RAT in C#☆26Updated 4 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆96Updated 3 years ago
- Mini Wordress Exploiter using CVE2020☆31Updated 4 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25Updated 5 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 6 months ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆15Updated 4 years ago
- ./kumasia php simple backdoor☆22Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Easy to understand back door written in python☆35Updated 2 years ago