persistent windows backdoor with reverse shell
☆27May 22, 2020Updated 5 years ago
Alternatives and similar repositories for win-backdoor
Users that are interested in win-backdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Jun 4, 2019Updated 6 years ago
- this project is a smart sniffer made by BlackDOS team☆11Jun 14, 2017Updated 8 years ago
- Examples of basic windows API hooking techniques☆20Aug 31, 2020Updated 5 years ago
- Persistent & Undetectable Malware Backdoor☆28May 8, 2024Updated last year
- Delphi/Pascal PE Protector☆19Apr 3, 2017Updated 8 years ago
- A script to obfuscate powershell payloads , bypassing AMSI.dll and Windows Defender☆37Sep 28, 2019Updated 6 years ago
- CloudflaredRAT is a simple combination of popular open-source tools, wrapping a local-facing shell with Cloudflares Argo Tunnel in an exe…☆14Oct 30, 2020Updated 5 years ago
- AES Crypter for Society of Engineers Remote Access Trojan (RAT) Project Lead: Derek Ta Security Programmer: Taegan Warren☆16Nov 29, 2014Updated 11 years ago
- POC of CVE-2021-2394☆21Aug 2, 2021Updated 4 years ago
- A New Microsoft Windows Remote Administrator Tool [RAT] with Python by Sir.4m1R.☆112Apr 11, 2020Updated 5 years ago
- 💉 A tool that allows shellcode injection into another process's memory space. It works for both Windows x64 and x86 systems.☆12Oct 1, 2019Updated 6 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 3 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Jul 24, 2022Updated 3 years ago
- Ransomware hello kitty☆23Mar 18, 2021Updated 5 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- ☆17May 2, 2019Updated 6 years ago
- ☆13Jun 26, 2021Updated 4 years ago
- Simple ransomware to troll your friends. Encrypt and Decrypt a Windows computer using a simple xor encryption which is pretty basic!☆33Jan 10, 2021Updated 5 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- Download payload to disk and install it to startup then melt.☆35Apr 9, 2019Updated 6 years ago
- ⚙️ A ready-to-use template for creating interactive batch scripts.☆12Mar 12, 2025Updated last year
- Python UI Collection: widgets, templates, testing☆13Oct 8, 2022Updated 3 years ago
- Internet Explorer Organization Page☆23Oct 31, 2018Updated 7 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated last week
- A database of RAT collected from Internet☆159Sep 23, 2020Updated 5 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33May 28, 2019Updated 6 years ago
- RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware☆1,035Jun 3, 2021Updated 4 years ago
- malicious bash scripts☆10Apr 3, 2022Updated 3 years ago
- Refactoring for 51pwn online☆13Dec 9, 2022Updated 3 years ago
- Instant messenger honeypot☆16Mar 22, 2016Updated 10 years ago
- Multi-threaded, multi-os/platform (Linux/Windows) c2 server and Windows reverse TCP shell client both written in C.☆122May 30, 2022Updated 3 years ago
- Sqlmap 批量操作☆11Jan 27, 2016Updated 10 years ago
- The big-tool is for installing all hacking and security tools !☆10Jul 4, 2021Updated 4 years ago
- Light C++ Winsock Wrapper Library☆37Dec 9, 2017Updated 8 years ago
- The GTK Keylogger☆18Aug 11, 2023Updated 2 years ago
- Wordlist generator☆16Aug 18, 2020Updated 5 years ago
- A tool to locate people using social engineering.☆11Mar 13, 2022Updated 4 years ago