Unix remote-shell backdoor develop with Bash, Netcat, OpenSSL (data encryption with AES-128bit)
☆25Oct 21, 2017Updated 8 years ago
Alternatives and similar repositories for backdoorBash
Users that are interested in backdoorBash are comparing it to the libraries listed below
Sorting:
- Backdoor with Golang (Cross-Plateform)☆17Feb 17, 2022Updated 4 years ago
- Small Backdoor/rootkit for linux kernel☆21Jan 26, 2014Updated 12 years ago
- Build myself for cs project☆12Oct 29, 2020Updated 5 years ago
- Tool for locating patterns in (code) binaries, mainly for ROP addresses.☆18Jun 25, 2016Updated 9 years ago
- This is php backdoor hack to access directory, access to mysql, access to execute shell command☆25Oct 23, 2015Updated 10 years ago
- CVE-2018-1111 DynoRoot☆12May 21, 2018Updated 7 years ago
- Home made trojan (c/c++)☆12Apr 14, 2023Updated 2 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- A set of tools which solves the coin change problem to generate ROP payloads☆18Aug 18, 2014Updated 11 years ago
- rsmware forked C#/PHP/MySQL☆14Apr 27, 2017Updated 8 years ago
- A Python ctypes package for libyara☆31Aug 4, 2015Updated 10 years ago
- SHIFT后门,适用于windows xp\2003 server\2008 server☆17May 4, 2014Updated 11 years ago
- based on search engine and get the valid infomation to test the vulnerability☆16Jun 16, 2016Updated 9 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Aug 11, 2016Updated 9 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- This is a fuzzer for automated web application scanners and vulnerability scanners. The idea is to send an unexpectedly large response to…☆24Oct 11, 2015Updated 10 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Oct 31, 2017Updated 8 years ago
- Hardware keylogger dongle with built-in Wi-Fi for live keystroke capture/injection and other fun stuff☆21May 13, 2016Updated 9 years ago
- Try various exploits to get root☆19Nov 14, 2013Updated 12 years ago
- asp命令执行webshell☆19Oct 27, 2014Updated 11 years ago
- PHPEB is a small tool that generates and stores obfuscated shellcode in user specified EXIF handlers.☆80Apr 17, 2017Updated 8 years ago
- Port scanning and domain utility.☆29Sep 8, 2017Updated 8 years ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago
- cuz life is scriptable...☆26Updated this week
- Penetration testing on windows(7 or 8)☆25Oct 21, 2020Updated 5 years ago
- Library for Dissect and Infect ELF Binaries.☆40Apr 27, 2025Updated 10 months ago
- [discontinued] Mass exploiter of CVE 2015-8562 for Joomla! CMS☆23Nov 17, 2017Updated 8 years ago
- My utils written for Reverse Engineering, mainly in python☆49Feb 11, 2014Updated 12 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- Automatically scans for malicious proxies.☆31Mar 7, 2015Updated 10 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Dec 17, 2015Updated 10 years ago
- Metasploit/MSFVenom Payload Generator Stand Alone☆31May 5, 2017Updated 8 years ago
- (DOM-)XSS fuzzer based on phantomjs and go.☆34Dec 18, 2014Updated 11 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Sep 26, 2021Updated 4 years ago
- ☆11Dec 23, 2018Updated 7 years ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- View tables, check queries and see entity descriptions for a SQLite3 database☆10Oct 15, 2014Updated 11 years ago
- ☆10Sep 3, 2021Updated 4 years ago