Tools for maintaining access to systems and proof-of-concept demonstrations.
☆182Feb 2, 2026Updated 2 months ago
Alternatives and similar repositories for backdoors
Users that are interested in backdoors are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of tools created for computer security research purposes.☆138Feb 2, 2026Updated 2 months ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆51Feb 2, 2026Updated 2 months ago
- Papers, presentations and documents from the team at Hacker House.☆53Feb 2, 2026Updated 2 months ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆26Feb 2, 2026Updated 2 months ago
- AES-256 Microsoft Cryptography API Example Use.☆35Feb 2, 2026Updated 2 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- cve-2018-10933 libssh authentication bypass☆110Feb 2, 2026Updated 2 months ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆23Feb 2, 2026Updated 2 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆183Feb 2, 2026Updated 2 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆78Aug 25, 2025Updated 7 months ago
- rust clr heap encryption (https://github.com/lap1nou/CLR_Heap_encryption), but no heap encryption.☆17Jan 6, 2024Updated 2 years ago
- Github profile☆21Feb 2, 2026Updated 2 months ago
- Microsoft Telnet Client MS-TNAP Server-Side Authentication Token Exploit☆63Feb 2, 2026Updated 2 months ago
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 14, 2018Updated 7 years ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Jan 25, 2025Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆223Nov 3, 2025Updated 5 months ago
- 免杀木马样本☆105Oct 11, 2025Updated 5 months ago
- Sliver agents for Mythic☆48Nov 18, 2024Updated last year
- Red Team Projects with chat.openai.com.☆17Apr 3, 2023Updated 3 years ago
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆302Feb 2, 2026Updated 2 months ago
- A bunch of shenanigans using functions, VEH and more☆38Jun 8, 2025Updated 9 months ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆41Sep 9, 2023Updated 2 years ago
- Build wordlists from the common-crawl index☆12Oct 9, 2022Updated 3 years ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆319Feb 2, 2026Updated 2 months ago
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 11 months ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Feb 5, 2022Updated 4 years ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 8 months ago
- Indirect Syscall with TartarusGate Approach in Go☆135Jul 8, 2025Updated 8 months ago
- Patching "signtool.exe" to accept expired certificates for code-signing.☆342Feb 2, 2026Updated 2 months ago
- Load various payload (DLL from memory, Exe, etc...) in a way to evade static analysis of Antivirus. It can fetch data from various method…☆22Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆383Dec 13, 2024Updated last year
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Oct 4, 2024Updated last year
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆58Feb 2, 2026Updated 2 months ago
- A stager and implant that executes remote Web Assembly☆63Feb 4, 2026Updated 2 months ago
- GitHub CVE Repository Hunt☆17Jul 23, 2024Updated last year
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 6 years ago
- Collection of random RedTeam scripts.☆212Mar 8, 2024Updated 2 years ago