malwarekid / Nim-BackdoorLinks
The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via a netcat-like session. This tool is designed to work on both Linux and Windows systems. Notably, it has been engineered to bypass popular antivirus software such as Microsoft Defender, Bitdefender, and Kaspersk…
☆46Updated 11 months ago
Alternatives and similar repositories for Nim-Backdoor
Users that are interested in Nim-Backdoor are comparing it to the libraries listed below
Sorting:
- Hacking with PasteJacking technique☆22Updated 11 months ago
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆23Updated 7 months ago
- A Powerfull Windows Ransomware with a Fully Undetectable Persistent Backdoor | System Halt Attack etc☆24Updated 3 years ago
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆37Updated this week
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆41Updated 3 months ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆58Updated 2 months ago
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆22Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆53Updated last year
- Tool for automate bug hunting process 🔍 --> 🍭☆42Updated 10 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆61Updated 4 years ago
- Nmap & SQL injection automation tool☆35Updated 8 months ago
- A tool for automatically change the Tor IP address over time.☆88Updated 2 months ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆23Updated 3 years ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆23Updated 4 years ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆62Updated last year
- SilverTGOSINT is a Telegram OSINT tool that collects messages from target users in Telegram groups and tracks users who extract data from…☆28Updated last month
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- Clipboard poisoning attack.☆58Updated 5 years ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆35Updated 11 months ago
- AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effecti…☆31Updated last month
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆30Updated last week
- PassBreaker☆63Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated 2 years ago
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆19Updated 2 years ago
- POC | Steal user WhatsApp information/data☆65Updated last month
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆26Updated 11 months ago
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆30Updated 2 months ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆29Updated 2 years ago
- ☆18Updated last week