hackerhouse-opensource / backdoors
Tools for maintaining access to systems and proof-of-concept demonstrations.
☆107Updated 5 years ago
Alternatives and similar repositories for backdoors:
Users that are interested in backdoors are comparing it to the libraries listed below
- A collection of tools created for computer security research purposes.☆121Updated 5 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆47Updated 4 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆141Updated 3 years ago
- Papers, presentations and documents from the team at Hacker House.☆50Updated 5 years ago
- PowerShell payload generator☆116Updated 3 years ago
- easy-to-use payload hosting☆269Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 4 months ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- ☆9Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆60Updated 4 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆76Updated 4 years ago
- All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications☆65Updated 6 years ago
- DLL Generator for side loading attack☆170Updated 6 years ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆133Updated last year
- ☆52Updated 6 years ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆75Updated last year
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 4 years ago
- SMBMap is a handy SMB enumeration tool☆37Updated 9 months ago
- Some random tools I use for penetration testing☆88Updated last month
- SPF are not as strong as you may think. Red Team tool to send email on behalf of your target corp☆138Updated 4 years ago
- Automated 802.1x Bypass☆84Updated 5 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆176Updated 2 years ago
- ☆135Updated last year
- Dll that can be used for side loading and other attack vector.☆201Updated 4 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 2 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆85Updated 4 years ago
- An advanced graphical search engine for Exploit-DB☆117Updated 10 months ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆210Updated 4 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- lateral movement techniques that can be used during red team exercises☆270Updated 5 years ago