☆128Jun 12, 2015Updated 10 years ago
Alternatives and similar repositories for backdoors
Users that are interested in backdoors are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆424Aug 29, 2017Updated 8 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Oct 20, 2015Updated 10 years ago
- See here:☆43Dec 6, 2012Updated 13 years ago
- peinjector - MITM PE file infector☆611May 11, 2016Updated 9 years ago
- libpcap based ICMP encrypted backdoor for linux.☆132Mar 26, 2021Updated 4 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- This Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method.☆687Oct 27, 2016Updated 9 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆300May 5, 2016Updated 9 years ago
- ☆27Jul 18, 2017Updated 8 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 12 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Unix remote login tool, rootkit shell tool☆32Jun 11, 2015Updated 10 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆250Nov 24, 2015Updated 10 years ago
- Learn from Casey Smith @subTee☆240Jul 18, 2017Updated 8 years ago
- Useful pentesting scripts☆86Feb 1, 2025Updated last year
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- Specify targets and run sets of tools against them☆387Apr 23, 2019Updated 6 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆88Jan 27, 2015Updated 11 years ago
- RWMC is no longer supported. Please use PowerMemory.☆164Feb 13, 2016Updated 10 years ago
- HTTP/S Beaconing Implant☆311Aug 25, 2017Updated 8 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago
- Interactive remote PowerShell Payload☆78Jan 21, 2016Updated 10 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,349Nov 16, 2018Updated 7 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- A fast and stealthy credential harvester☆628Jul 11, 2023Updated 2 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- powerful auto-backdooring utility☆750Dec 20, 2017Updated 8 years ago
- A PoC WMI backdoor presented at Black Hat 2015☆276Aug 10, 2015Updated 10 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Oct 11, 2015Updated 10 years ago
- Passive recon / OSINT automation script☆39Nov 3, 2018Updated 7 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 11 years ago
- Exploit the credentials present in files and memory☆844May 25, 2023Updated 2 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆226Dec 29, 2015Updated 10 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆221Nov 29, 2016Updated 9 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Sep 29, 2015Updated 10 years ago
- Patch pyc files with your code. Fairly lame.☆67Nov 10, 2015Updated 10 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79May 18, 2017Updated 8 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43May 27, 2015Updated 10 years ago