☆352May 25, 2023Updated 2 years ago
Alternatives and similar repositories for ssh-key-backdoor
Users that are interested in ssh-key-backdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Aug 31, 2023Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- ☆148May 22, 2023Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- HVNC for Cobalt Strike☆1,323Dec 7, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- UAC Bypass By Abusing Kerberos Tickets☆509Aug 10, 2023Updated 2 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Harvest passwords automatically from OpenSSH server☆377May 25, 2023Updated 2 years ago
- Remote Shellcode Injector☆221Aug 27, 2023Updated 2 years ago
- Kraken, a modular multi-language webshell coded by @secu_x11☆550Feb 10, 2024Updated 2 years ago
- Connect like there is no firewall. Securely.☆1,863Mar 25, 2026Updated last month
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆792Jan 9, 2025Updated last year
- ☆39May 20, 2023Updated 2 years ago
- ☆165Oct 25, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Various tips & tricks☆3,826Apr 29, 2026Updated last week
- Encoder PHP webshell to bypass WAF using XOR operations.☆55Aug 2, 2023Updated 2 years ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆292Mar 5, 2025Updated last year
- Kill AV/EDR leveraging BYOVD attack☆402Jul 11, 2023Updated 2 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Docker environment for hackers☆18Jun 20, 2020Updated 5 years ago
- Weaponized HellsGate/SigFlip☆207Jun 7, 2023Updated 2 years ago
- ☆291Jul 20, 2023Updated 2 years ago
- ☆708Nov 7, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PoC to coerce authentication from Windows hosts using MS-WSP☆307Sep 7, 2023Updated 2 years ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆689Oct 23, 2025Updated 6 months ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆283Aug 5, 2023Updated 2 years ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆438Mar 28, 2026Updated last month
- Signtool for expired certificates☆517Jun 10, 2023Updated 2 years ago
- RCE exploit for CVE-2023-3519☆228Aug 23, 2023Updated 2 years ago
- it is very good☆515Dec 20, 2022Updated 3 years ago
- Collection of random RedTeam scripts.☆212Mar 8, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Generate an obfuscated DLL that will disable AMSI & ETW☆332Jul 15, 2024Updated last year
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆625Jan 2, 2025Updated last year
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆889Mar 21, 2025Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆3,253Mar 28, 2025Updated last year
- Dump NTDS with golden certificates and UnPAC the hash☆649Mar 20, 2024Updated 2 years ago
- Lifetime AMSI bypass by @ZeroMemoryEx ported to .NET Framework 4.8☆353Aug 29, 2024Updated last year
- Duplicate not owned Token from Running Process☆73Jul 21, 2023Updated 2 years ago