gitdurandal / dbdLinks
Durandal's Backdoor
☆148Updated 2 years ago
Alternatives and similar repositories for dbd
Users that are interested in dbd are comparing it to the libraries listed below
Sorting:
- Miscellaneous projects related to attacking Windows.☆199Updated 11 years ago
- ASTROID v 1.2 bypass most A.V softwares☆88Updated 8 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆97Updated 8 years ago
- Ye olde root shell for ye olde httpd☆44Updated 10 years ago
- Acunetix 0day RCE☆192Updated 9 years ago
- VBScript obfuscation to allow PenTesters bypass countermeasures.☆125Updated 3 years ago
- Avoidz tool to bypass most A.V softwares☆139Updated 8 years ago
- Web Backdoor Cookie Script-Kit☆187Updated 13 years ago
- Aggressor Script to launch IE driveby for CVE-2018-4878☆87Updated 7 years ago
- DNS2Proxy offensive proxy version for HSTS☆29Updated 7 years ago
- A little post-exploit tool that carefully clean *NIX access logs☆120Updated 7 years ago
- PHP root (suid) reverse shell☆74Updated 8 years ago
- MS17-010 exploits, payloads, and scanners☆94Updated 8 years ago
- Proof of Concept exploit for CVE-2017-8570☆184Updated 7 years ago
- initial commit☆174Updated 7 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 5 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆123Updated 7 years ago
- Using IPv6 to Bypass Security☆92Updated 3 months ago
- Green-hat-suite is a tool to generate meterpreter/shell which could evade antivirus.☆131Updated 7 years ago
- Meterpreter_Payload_Detection.exe tool for detecting Meterpreter in memory like IPS-IDS and Forensics tool☆164Updated 2 years ago
- CVE20178570☆95Updated 8 years ago
- Simple python backdoor with Ngrok tunnel support☆206Updated 2 years ago
- A webshell connection tool with customized WAF bypass payloads☆125Updated 7 years ago
- Custom THP Dropper☆26Updated 7 years ago
- Test and exploit for CVE-2017-12542☆88Updated 7 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆103Updated 7 years ago
- This is a linux rootkit using many of the techniques described on☆166Updated 6 years ago
- PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)☆272Updated 7 years ago
- Deploy payloads to *Nix systems en masse☆109Updated 5 years ago
- Remote Administration Toolkit (or Trojan) for POSiX (Linux/Unix) system working as a Web Service☆171Updated 6 years ago