hackerhouse-opensource / backdoorsLinks
Tools for maintaining access to systems and proof-of-concept demonstrations.
☆168Updated 3 months ago
Alternatives and similar repositories for backdoors
Users that are interested in backdoors are comparing it to the libraries listed below
Sorting:
- A collection of tools created for computer security research purposes.☆124Updated 5 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆109Updated last year
- Creates and sends fake meeting invite☆66Updated 4 years ago
- Simple & Customizable DNS Data Exfiltrator☆110Updated 2 years ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆78Updated last year
- PowerShell payload generator☆117Updated 3 years ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆133Updated last year
- Malware vulnerability intel tool for third-party attackers☆120Updated 8 months ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆157Updated last year
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 4 years ago
- Extract credentials and other useful info from network captures☆70Updated 2 years ago
- LD_PRELOAD rootkit☆133Updated last year
- The most average C2 ever (MACE)☆96Updated 3 years ago
- eXtensions for Financial Services (XFS) proof of concept client to explore and issue commands directly to the devices that support the pr…☆81Updated 4 years ago
- Script to perform some hashcracking logic automagically☆72Updated last year
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- This repository is my own list of tools / useful stuff for pentest, defensive activities, programming, lockpicking and physical security☆60Updated 2 years ago
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆52Updated 2 years ago
- Linux Persistence Toolkit☆59Updated 2 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆74Updated last year
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆62Updated 5 years ago
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- Rewriting SIET to python3☆50Updated 9 months ago
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 3 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- C2 Automation using Linode☆82Updated 2 years ago
- Upload files done during my research.☆163Updated 3 months ago
- This project is aimed at freely providing technical guides on various hacking tools.☆117Updated last year
- Lite version of my Gatekeeper backdoor for public use.☆53Updated 3 years ago