malwarekid / Nim-BackdoorLinks
The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via a netcat-like session. This tool is designed to work on both Linux and Windows systems. Notably, it has been engineered to bypass popular antivirus software such as Microsoft Defender, Bitdefender, and Kaspersk…
☆52Updated last year
Alternatives and similar repositories for Nim-Backdoor
Users that are interested in Nim-Backdoor are comparing it to the libraries listed below
Sorting:
- Hacking with PasteJacking technique☆22Updated last year
- A Powerfull Windows Ransomware with a Fully Undetectable Persistent Backdoor | System Halt Attack etc☆24Updated 4 years ago
- Ded Security Framework is a tool aimed at security professionals☆36Updated last year
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆43Updated last month
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆21Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated last year
- PassBreaker☆64Updated last year
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 5 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated 2 years ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆62Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- This is a exploit with the capability to control ip camera movement even without a username and password.☆70Updated 7 months ago
- Social Engineering Browser Update Attack.☆58Updated 2 years ago
- SilverTGOSINT is a Telegram OSINT tool that collects messages from target users in Telegram groups and tracks users who extract data from…☆48Updated 6 months ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆27Updated 3 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆66Updated 4 years ago
- What is Phone Track? So phonetrack is a type of OSINT that is used to track someone's location just based on their telephone number☆79Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆42Updated last year
- A comprehensive web application security testing toolkit that combines 10 powerful penetration testing features into one tool.☆40Updated 6 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- Clipboard poisoning attack.☆58Updated 5 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Updated 2 years ago
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆24Updated 2 years ago
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆17Updated last year
- IPAnalyzer is an IP Address Tracker OSINT ethical hacking tool built for Linux distributions, designed to gather detailed information abo…☆49Updated last month
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆21Updated 3 years ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆25Updated 4 years ago
- Nmap & SQL injection automation tool☆38Updated last year
- Interactive shell to execute commands anonymously using Proxychains and Tor☆46Updated 2 years ago