samdenty / backdoor-controllerLinks
Masking the Sethc.exe backdoor with an anti-detection system.
☆29Updated 8 years ago
Alternatives and similar repositories for backdoor-controller
Users that are interested in backdoor-controller are comparing it to the libraries listed below
Sorting:
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134Updated 6 years ago
- A simple python reverse shell written just for fun.☆63Updated 2 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Updated 5 years ago
- pinky - The PHP mini RAT (Remote Administration Tool)☆77Updated 7 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆23Updated 9 years ago
- A python Code to obfuscate any non-fud python payload and generate a ready to use FUD Python executable script☆24Updated 6 years ago
- PowerShell Reverse HTTPs Shell☆29Updated 11 years ago
- outis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) a…☆126Updated 8 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Updated last year
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 8 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆58Updated 2 years ago
- Random stuff☆16Updated 7 years ago
- Simple PowerShell Base64 encoder to avoid detection of your malicious payload☆81Updated 7 years ago
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆104Updated 7 years ago
- ☆26Updated 6 years ago
- ☆51Updated 11 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 8 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆24Updated 7 years ago
- Avoidz tool to bypass most A.V softwares☆139Updated 8 years ago
- Transferring Backdoor Payloads with BMP Image Pixels☆83Updated 2 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆42Updated 7 years ago
- Converts a command to a base64 powershell compatible string☆27Updated 11 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆55Updated 7 years ago
- Creates a .lnk file with unicode chars that reverse the file extension and adds a .txt to the end to make it appear as a textfile. Paylo…☆115Updated 5 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Updated 8 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆30Updated 4 years ago
- A Linux RAT in C☆33Updated 7 years ago
- $2100 .Exe to .Doc Exploit (Python)☆52Updated 5 years ago