Linux backdoor implementation written in Python
☆58May 25, 2015Updated 10 years ago
Alternatives and similar repositories for backdoor
Users that are interested in backdoor are comparing it to the libraries listed below
Sorting:
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- A Linux Kernel Module that adds a backdoor to your system☆39Mar 18, 2009Updated 16 years ago
- Parse HTTP Security Headers☆40Sep 12, 2024Updated last year
- ☆17Nov 25, 2015Updated 10 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Aug 2, 2016Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago
- A XPath injection demonstration application☆21Nov 14, 2020Updated 5 years ago
- Python tools for interacting with a DarkComet Client☆54Aug 4, 2015Updated 10 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆58Jun 26, 2015Updated 10 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Jul 5, 2016Updated 9 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Mar 14, 2017Updated 8 years ago
- some python3 functions to add spreading features to any python backdoor☆55Jan 22, 2017Updated 9 years ago
- Attempt to make a python based Operating System, it means that we use language feature to provide security instead of using hardware as i…☆10Jul 22, 2016Updated 9 years ago
- A simple script that automates basic pentester reconaissance starting from nmap scans.☆10Dec 10, 2016Updated 9 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- Packet Knock-Out is an exploration in a method of data exfiltration via packet port numbers.☆14Sep 18, 2016Updated 9 years ago
- Project that aims to let student teams write their own virus which must not be detected by team self-developped antivirus.☆13Mar 19, 2013Updated 12 years ago
- Slightly modified version of https://raw.githubusercontent.com/killswitch-GUI/CobaltStrike-ToolKit/master/HTTPsC2DoneRight.sh☆12Nov 16, 2017Updated 8 years ago
- Automated man-in-the-middle attack tool.☆52Sep 4, 2014Updated 11 years ago
- Gozi-MBR-rootkit Bootkit Modified☆69Oct 25, 2016Updated 9 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75May 8, 2018Updated 7 years ago
- Ring3 Rootkit Backdoor.☆42Jul 20, 2015Updated 10 years ago
- Application for STIX v2.0 objects management and analysis☆27Nov 9, 2017Updated 8 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Mar 22, 2017Updated 8 years ago
- ☆33May 23, 2014Updated 11 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 8 years ago
- OUTDATED☆11Mar 8, 2020Updated 6 years ago
- Windows Privilege Escalation☆10Dec 27, 2014Updated 11 years ago
- Free Email Providers☆11Aug 15, 2023Updated 2 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Modular tool to test exfiltration techniques.☆37Apr 27, 2017Updated 8 years ago