The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via a netcat-like session. This tool is designed to work on both Linux and Windows systems. Notably, it has been engineered to bypass popular antivirus software such as Microsoft Defender, Bitdefender, and Kaspersk…
☆64Jul 18, 2024Updated last year
Alternatives and similar repositories for Nim-Backdoor
Users that are interested in Nim-Backdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆30Jul 17, 2024Updated last year
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16May 6, 2024Updated last year
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆22Nov 6, 2024Updated last year
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆18Aug 7, 2024Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13May 19, 2024Updated last year
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆43Jun 30, 2024Updated last year
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 3 months ago
- BLE cha0s t00lkit xox☆86Dec 20, 2025Updated 3 months ago
- fsociety Hacking Tools Pack – A Penetration Testing Framework☆14Aug 8, 2024Updated last year
- HID payloads for good purpose☆10Dec 17, 2024Updated last year
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆18Feb 10, 2022Updated 4 years ago
- PortForce - A custom port Brute Forcing Tool for CTF's & Pentests☆32Jul 18, 2017Updated 8 years ago
- A comprehensive guide to becoming a hacker, covering skills, tools, and best practices to master cybersecurity and hacking techniques.☆16May 22, 2025Updated 10 months ago
- QR code Ghostmode☆25Jul 30, 2025Updated 7 months ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆14Apr 8, 2024Updated last year
- Ini adalah kumpulan webshell atau backdoor yang lengkap☆18Aug 18, 2024Updated last year
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Automated enumeration for red teamers☆11Nov 22, 2022Updated 3 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- web based c2 🏴☠️☆15Aug 10, 2024Updated last year
- File and executable crypter with comprehensible GUI and built-in anti-malicious use☆20Sep 3, 2020Updated 5 years ago
- BypassPlayProtect - Ferramenta Para Bypass da Play Protect Android☆18Sep 9, 2024Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to exploit a system or server that ru…☆18Jan 15, 2019Updated 7 years ago
- This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as p…☆10Jan 7, 2025Updated last year
- Script related in Active Directory Attacks Domain☆24Aug 19, 2023Updated 2 years ago
- ☆10Apr 18, 2019Updated 6 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- ☆12Oct 21, 2024Updated last year
- ☆12Apr 25, 2025Updated 11 months ago
- Simple auth flow to golang apps☆20Jul 5, 2022Updated 3 years ago
- HTB recon tool to simplify part of the enumeration process☆13May 14, 2025Updated 10 months ago
- ☆18May 11, 2021Updated 4 years ago
- It is the best proxy checker, super fast!☆32Nov 16, 2025Updated 4 months ago
- The best discord companion for your Server☆12Jan 11, 2025Updated last year
- Fluxion is the future of MITM WPA attacks Fluxion is a security auditing and social-engineering research tool. It is a remake of linset …☆16Oct 1, 2020Updated 5 years ago
- Script to auto generate Python package info on requirements.txt☆11Jul 28, 2023Updated 2 years ago
- Advanced wireless penetration testing tools☆20Jan 19, 2022Updated 4 years ago