☆128Jun 12, 2015Updated 10 years ago
Alternatives and similar repositories for backdoors
Users that are interested in backdoors are comparing it to the libraries listed below
Sorting:
- ☆424Aug 29, 2017Updated 8 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- See here:☆43Dec 6, 2012Updated 13 years ago
- peinjector - MITM PE file infector☆611May 11, 2016Updated 9 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 11 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆300May 5, 2016Updated 9 years ago
- This Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method.☆686Oct 27, 2016Updated 9 years ago
- ☆27Jul 18, 2017Updated 8 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Oct 20, 2015Updated 10 years ago
- libpcap based ICMP encrypted backdoor for linux.☆132Mar 26, 2021Updated 4 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆88Jan 27, 2015Updated 11 years ago
- Useful pentesting scripts☆86Feb 1, 2025Updated last year
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- Learn from Casey Smith @subTee☆240Jul 18, 2017Updated 8 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆84May 9, 2014Updated 11 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Oct 11, 2015Updated 10 years ago
- Passive recon / OSINT automation script☆39Nov 3, 2018Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Jul 17, 2016Updated 9 years ago
- Specify targets and run sets of tools against them☆386Apr 23, 2019Updated 6 years ago
- Password cracking utility☆54Apr 6, 2021Updated 4 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆250Nov 24, 2015Updated 10 years ago
- HTTP/S Beaconing Implant☆311Aug 25, 2017Updated 8 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆226Dec 29, 2015Updated 10 years ago
- Exploit the credentials present in files and memory☆842May 25, 2023Updated 2 years ago
- A shell / chat bot for XMPP and cloud services☆49Oct 10, 2015Updated 10 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,348Nov 16, 2018Updated 7 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆67Sep 13, 2014Updated 11 years ago
- A fuzzing script for MitmProxy☆24May 15, 2015Updated 10 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- Unix remote login tool, rootkit shell tool☆32Jun 11, 2015Updated 10 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 12 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- A Python-Based script designed to output stable and screen-scrapable lists of wireless networks☆15Jun 19, 2014Updated 11 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆221Nov 29, 2016Updated 9 years ago
- Python-based tool to dump security information from Windows systems☆280Jun 22, 2020Updated 5 years ago