hackerhouse-opensource / backdoorsLinks
Tools for maintaining access to systems and proof-of-concept demonstrations.
☆168Updated 2 months ago
Alternatives and similar repositories for backdoors
Users that are interested in backdoors are comparing it to the libraries listed below
Sorting:
- A collection of tools created for computer security research purposes.☆125Updated 5 years ago
- Creates and sends fake meeting invite☆64Updated 4 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆198Updated last month
- Simple & Customizable DNS Data Exfiltrator☆110Updated last year
- PowerShell payload generator☆117Updated 3 years ago
- Script collection to bypass Network Access Control (NAC, 802.1x)☆313Updated last month
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Roast in the Middle☆292Updated 7 months ago
- Malware vulnerability intel tool for third-party attackers☆120Updated 8 months ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆258Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆62Updated 5 years ago
- ☆409Updated last year
- ☆190Updated 2 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 2 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆393Updated 3 months ago
- The most average C2 ever (MACE)☆96Updated 3 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆392Updated last year
- ☆78Updated 4 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆49Updated 4 years ago
- This repository is my own list of tools / useful stuff for pentest, defensive activities, programming, lockpicking and physical security☆59Updated 2 years ago
- Basic C2 Server☆191Updated 3 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆333Updated 8 months ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆181Updated 2 months ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆331Updated 11 months ago
- Papers, presentations and documents from the team at Hacker House.☆51Updated 5 years ago
- An open-source process injection enumeration tool written in C#☆171Updated 2 years ago
- Dll that can be used for side loading and other attack vector.☆201Updated 4 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 3 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆141Updated 3 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆74Updated last year