malwarekid / Nim-Backdoor
The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via a netcat-like session. This tool is designed to work on both Linux and Windows systems. Notably, it has been engineered to bypass popular antivirus software such as Microsoft Defender, Bitdefender, and Kaspersk…
☆43Updated 8 months ago
Alternatives and similar repositories for Nim-Backdoor:
Users that are interested in Nim-Backdoor are comparing it to the libraries listed below
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆57Updated 11 months ago
- Ded Security Framework is a tool aimed at security professionals☆34Updated 10 months ago
- Hacking with PasteJacking technique☆21Updated 9 months ago
- A Powerfull Windows Ransomware with a Fully Undetectable Persistent Backdoor | System Halt Attack etc☆24Updated 3 years ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆22Updated 3 years ago
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆23Updated 4 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆60Updated 3 years ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆20Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated 10 months ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆22Updated 3 years ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated 10 months ago
- Simple Tool for webhacking☆11Updated last year
- This is a exploit with the capability to control ip camera movement even without a username and password.☆57Updated 7 months ago
- Tool for bypassing logins vulnerable against SQL injection☆45Updated 11 months ago
- Dogma V1.5.3☆28Updated 5 years ago
- Collection of extra pentest tools for Kali Linux☆103Updated last year
- The africana-framework is a software designed for network & web hacking by automating as much stuff as possible to detect vulnerabilities…☆32Updated this week
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆18Updated 2 years ago
- Subdomain Bruteforce - Bounty Quick Code☆30Updated 6 months ago
- ☆27Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆13Updated 2 years ago
- ☆14Updated 8 months ago
- Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.☆74Updated 2 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆69Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆25Updated 2 years ago
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 4 years ago