malwarekid / Nim-Backdoor
The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via a netcat-like session. This tool is designed to work on both Linux and Windows systems. Notably, it has been engineered to bypass popular antivirus software such as Microsoft Defender, Bitdefender, and Kaspersk…
☆40Updated 7 months ago
Alternatives and similar repositories for Nim-Backdoor:
Users that are interested in Nim-Backdoor are comparing it to the libraries listed below
- Tool for bypassing logins vulnerable against SQL injection☆44Updated 11 months ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆57Updated 10 months ago
- PassBreaker☆58Updated 10 months ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated 9 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆12Updated 9 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated 11 months ago
- Hacking with PasteJacking technique☆21Updated 8 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆16Updated 6 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆23Updated 3 months ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆38Updated 5 months ago
- Mass bruteforce authentication of common services with common credentials.☆45Updated last year
- A Powerfull Windows Ransomware with a Fully Undetectable Persistent Backdoor | System Halt Attack etc☆24Updated 3 years ago
- Pentesting Tools to Automatize Active Directory Hacking☆17Updated 2 years ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆30Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆31Updated 9 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- Ded Security Framework is a tool aimed at security professionals☆34Updated 9 months ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆14Updated last month
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆13Updated 2 years ago
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆18Updated last week
- This repository contains the best fuzzing wordlist files☆29Updated 3 months ago
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆18Updated last year
- Simple Tool for webhacking☆11Updated last year
- An automated e-mail OSINT tool☆20Updated 2 years ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year