hackerhouse-opensource / backdoorsLinks
Tools for maintaining access to systems and proof-of-concept demonstrations.
☆168Updated 3 months ago
Alternatives and similar repositories for backdoors
Users that are interested in backdoors are comparing it to the libraries listed below
Sorting:
- A collection of tools created for computer security research purposes.☆125Updated 5 years ago
- Simple & Customizable DNS Data Exfiltrator☆110Updated 2 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆109Updated last year
- Malware vulnerability intel tool for third-party attackers☆121Updated 9 months ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 4 years ago
- Linux Persistence Toolkit☆60Updated 2 years ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆133Updated last year
- PowerShell payload generator☆117Updated 3 years ago
- Lite version of my Gatekeeper backdoor for public use.☆53Updated 3 years ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆160Updated last year
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- Creates and sends fake meeting invite☆67Updated 4 years ago
- LD_PRELOAD rootkit☆134Updated last year
- The most average C2 ever (MACE)☆97Updated 3 years ago
- ☆140Updated last year
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆79Updated last year
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆142Updated 3 years ago
- Some random tools I use for penetration testing☆90Updated 4 months ago
- Script to perform some hashcracking logic automagically☆73Updated last year
- C2 Automation using Linode☆82Updated 2 years ago
- Extract credentials and other useful info from network captures☆70Updated 2 years ago
- A WLAN red team framework.☆157Updated 10 months ago
- ☆85Updated 2 years ago
- Rodan Exploitation Framework☆100Updated 3 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆101Updated 3 months ago
- Basic C2 Server☆190Updated 4 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 2 years ago
- exfiltration/infiltration toolkit☆46Updated 9 months ago