A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pipe remote input into cmd or bash and output the response. This is useful, but it is also limited. BetterBackdoor overcomes these limitations by including the ability to inject keystrokes, get screenshots, transf…
☆13Apr 26, 2021Updated 5 years ago
Alternatives and similar repositories for BetterBackdoor---A-Backdoor-With-A-Multitude-Of-Features
Users that are interested in BetterBackdoor---A-Backdoor-With-A-Multitude-Of-Features are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Teamsniper is a tool for fetching keywords in a Microsoft Teams such as (passwords, emails, database, etc.).☆16Sep 26, 2022Updated 3 years ago
- Arduino Rubber Ducky script to steal all saved WIFI passwords from Windows.☆12Jun 15, 2017Updated 8 years ago
- IOS 17 Scripts for Iphone IOS 17☆13Apr 30, 2024Updated 2 years ago
- Setup Unity and Visual Studio on Mac and PC. Use Unity's editor to position, rotate and scale game objects. Understand prefabs. Write ve…☆25May 22, 2018Updated 7 years ago
- This is a collection of Flipper Zero BadUSB scripts written in DuckyScript.☆15Jan 15, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Feb 4, 2021Updated 5 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- A GUI tool for Brute Force Login in a web page with Python, hack accounts on any website with a good dictionary of words. Also brute forc…☆29Apr 26, 2022Updated 4 years ago
- ☆17Mar 1, 2013Updated 13 years ago
- Very basic pathfinding, C# design patterns for more complex games, UI including menus. (Ref: RR_CU2) http://gdev.tv/cu2github☆16May 22, 2018Updated 7 years ago
- ☆17Jan 5, 2023Updated 3 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆21Sep 24, 2024Updated last year
- SchubiRat is a Minecraft Forge Session Stealer that is highly customizable and also provides a backend for maximum control and safety.☆11Mar 4, 2024Updated 2 years ago
- Windows hidden thread suspend POC with code injection☆12May 27, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- a PEN testing script for the rubber ducky that grabs the users login passwords, they will need to be decrypted using NTML method☆21Aug 2, 2021Updated 4 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆11Jun 3, 2017Updated 8 years ago
- a quickly script for Rubber Ducky to disable w10 defender on large scale☆24Oct 22, 2020Updated 5 years ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆27Sep 24, 2024Updated last year
- A malicious KeePass plugin to exfiltrate the master key.☆16Oct 25, 2021Updated 4 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆10Dec 12, 2020Updated 5 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- The payload will search for specific files in desktop then upload them as *zip to your web server☆37Sep 24, 2019Updated 6 years ago
- Hardware design files for the PMOD based MUX☆13Aug 22, 2019Updated 6 years ago
- SensePost's modified hostapd for wifi attacks.☆13Oct 11, 2020Updated 5 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 4 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- Your one-stop shop for everything you need to know during #Hack weekend.☆11May 31, 2019Updated 6 years ago
- Linux kernel source tree☆34Feb 11, 2026Updated 2 months ago
- radiotap parser C library☆12Jul 24, 2021Updated 4 years ago
- Prototyping only☆21Apr 17, 2022Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Guide to rooting and custom firmware on Samsung Galaxy S3 i9300☆10Apr 28, 2026Updated last week
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- # hpro This is a python base script from which you can hack or clone any person's facebook friendlist or followers accounts which have …☆11May 9, 2021Updated 5 years ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- Web-based BashBunny IDE☆10Mar 16, 2018Updated 8 years ago
- A one stop shop for all cyber tooling, frameworks and hacking methodologies☆11Jul 25, 2021Updated 4 years ago
- Security Logon Event Analysis Tools - a collection of scripts for collecting, parsing, and analyzing logon events from Windows Security L…☆16Jun 22, 2016Updated 9 years ago