☆351May 25, 2023Updated 2 years ago
Alternatives and similar repositories for ssh-key-backdoor
Users that are interested in ssh-key-backdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Aug 31, 2023Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- ☆148May 22, 2023Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,197Oct 16, 2023Updated 2 years ago
- HVNC for Cobalt Strike☆1,317Dec 7, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- UAC Bypass By Abusing Kerberos Tickets☆507Aug 10, 2023Updated 2 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Harvest passwords automatically from OpenSSH server☆376May 25, 2023Updated 2 years ago
- Remote Shellcode Injector☆221Aug 27, 2023Updated 2 years ago
- Kraken, a modular multi-language webshell coded by @secu_x11☆551Feb 10, 2024Updated 2 years ago
- Connect like there is no firewall. Securely.☆1,852Mar 25, 2026Updated 3 weeks ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆790Jan 9, 2025Updated last year
- ☆39May 20, 2023Updated 2 years ago
- ☆164Oct 25, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Various tips & tricks☆3,810Mar 25, 2026Updated 3 weeks ago
- Encoder PHP webshell to bypass WAF using XOR operations.☆55Aug 2, 2023Updated 2 years ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆287Mar 5, 2025Updated last year
- Kill AV/EDR leveraging BYOVD attack☆397Jul 11, 2023Updated 2 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Weaponized HellsGate/SigFlip☆207Jun 7, 2023Updated 2 years ago
- ☆289Jul 20, 2023Updated 2 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆305Sep 7, 2023Updated 2 years ago
- ☆706Nov 7, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆685Oct 23, 2025Updated 5 months ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆283Aug 5, 2023Updated 2 years ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆436Mar 28, 2026Updated 2 weeks ago
- Signtool for expired certificates☆513Jun 10, 2023Updated 2 years ago
- RCE exploit for CVE-2023-3519☆228Aug 23, 2023Updated 2 years ago
- it is very good☆514Dec 20, 2022Updated 3 years ago
- Collection of random RedTeam scripts.☆211Mar 8, 2024Updated 2 years ago
- Generate an obfuscated DLL that will disable AMSI & ETW☆331Jul 15, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆881Mar 21, 2025Updated last year
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆622Jan 2, 2025Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆3,183Mar 28, 2025Updated last year
- Dump NTDS with golden certificates and UnPAC the hash☆646Mar 20, 2024Updated 2 years ago
- Duplicate not owned Token from Running Process☆73Jul 21, 2023Updated 2 years ago
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆277May 10, 2024Updated last year
- Spartacus DLL/COM Hijacking Toolkit☆1,077Feb 1, 2024Updated 2 years ago