Masking the Sethc.exe backdoor with an anti-detection system.
☆29Dec 16, 2017Updated 8 years ago
Alternatives and similar repositories for backdoor-controller
Users that are interested in backdoor-controller are comparing it to the libraries listed below
Sorting:
- xCMDx monitors the clipboard for commands and prompts to execute when received.☆12Dec 16, 2017Updated 8 years ago
- Pixel-perfect replica of Windows 10, simulated in the browser with Vanilla JS.☆17Dec 16, 2017Updated 8 years ago
- CVE-2017-0199☆16Apr 19, 2017Updated 8 years ago
- Gadget Pentesting Tool Scripts☆37Nov 29, 2015Updated 10 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- Windows privilege escalation workstation☆17Nov 22, 2015Updated 10 years ago
- Axis2 RPC Shell☆15Sep 10, 2015Updated 10 years ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆23Aug 7, 2016Updated 9 years ago
- Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4☆18Mar 3, 2018Updated 7 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆23Feb 14, 2018Updated 8 years ago
- MiniPwner's website and forums aren't exactly clear on what you need to do. I'm here to help!☆20Jan 15, 2016Updated 10 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- Python implementation of the SlowLoris DoS attack.☆24Mar 19, 2017Updated 8 years ago
- Get a clean, ready-to-go Linux box in seconds.☆25Mar 12, 2024Updated last year
- Keylogger using FTP server as an intermediate with some cool additional functions☆22Apr 15, 2017Updated 8 years ago
- XXXX☆32Oct 29, 2017Updated 8 years ago
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- AN ESP32/8266 is used to receive sensor data from clients and then log and display the results☆22Sep 24, 2022Updated 3 years ago
- A collection of notes and script that will help you learn basics of hacking with Python☆34Nov 3, 2014Updated 11 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Jul 27, 2021Updated 4 years ago
- Todos los scripts y locuras del Blog SniferL4bs que sean desarrollados vendran en esta pequeña sección dedicada☆21Jun 22, 2024Updated last year
- Exploit web-vulnerabilities☆23Apr 9, 2019Updated 6 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- 在目标主机上执行php、asp、aspx 插件☆23Feb 1, 2019Updated 7 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- ☆12May 13, 2020Updated 5 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Apr 14, 2017Updated 8 years ago
- Remote Desktop Protocol in Twisted Python☆26Apr 13, 2018Updated 7 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆29Feb 15, 2019Updated 7 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- ☆30Aug 8, 2015Updated 10 years ago
- Array.prototype.slice wrong alias information.☆68Mar 25, 2019Updated 6 years ago
- ☆78May 24, 2018Updated 7 years ago
- some example ctf writeups☆27Oct 23, 2020Updated 5 years ago
- ☆32Sep 14, 2017Updated 8 years ago
- A reverse shell cheat-sheet tool☆39Mar 5, 2019Updated 6 years ago
- Download porn videos (Python)☆14Apr 12, 2018Updated 7 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago