A backdoor with a multitude of features.
☆293Oct 3, 2024Updated last year
Alternatives and similar repositories for BetterBackdoor
Users that are interested in BetterBackdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 8 months ago
- ParadoxiaRat : Native Windows Remote access Tool.☆822Apr 18, 2023Updated 2 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆142Jan 25, 2022Updated 4 years ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- RainbowSQL is very fast dork&SQL injection scanner.☆61Jun 12, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.☆328Nov 2, 2024Updated last year
- C2 Powershell Command & Control Framework with BuiltIn Commands☆505Mar 11, 2024Updated 2 years ago
- Penetration testing utility and antivirus assessment tool.☆314Apr 25, 2023Updated 2 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated 2 months ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Sep 9, 2019Updated 6 years ago
- The Shadow Attack Framework☆1,117Sep 4, 2022Updated 3 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Open source C2 server created for stealth red team operations☆837Sep 26, 2022Updated 3 years ago
- This project is a cross-platform backdoor/reverse shell and post-exploitation tool written in Python3☆756Aug 13, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- [POC] Asynchronous reverse shell using the HTTP protocol.☆272May 23, 2025Updated 10 months ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆783Jun 20, 2020Updated 5 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.☆279Aug 24, 2023Updated 2 years ago
- GodOfWar - Malicious Java WAR builder with built-in payloads☆126Apr 16, 2019Updated 6 years ago
- A native backdoor module for Microsoft IIS (Internet Information Services)☆555Jul 3, 2020Updated 5 years ago
- Fast and extensible network scanning library featuring multithreading, ping probing, and scan fetchers.☆40May 1, 2020Updated 5 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆507Sep 23, 2025Updated 6 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆249Sep 9, 2021Updated 4 years ago
- Linux Incident Response☆90Sep 22, 2019Updated 6 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆600Aug 27, 2024Updated last year
- Automatic UAC-Bypassing for custom payloads during privilege escalation testing☆98Aug 13, 2022Updated 3 years ago
- Hide your payload into .jpg file☆397Dec 23, 2021Updated 4 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆542Apr 14, 2021Updated 4 years ago
- Open source all-in-one CLI tool to semi-automate pentesting.☆176May 21, 2020Updated 5 years ago
- [WIP] A free and open-source, modular Remote Administration Tool (RAT) / Payload Dropper written in Go(lang) with a flexible command and …☆231Dec 3, 2023Updated 2 years ago
- Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows☆143Jul 11, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- Ps-Tools, an advanced process monitoring toolkit for offensive operations☆355Dec 1, 2020Updated 5 years ago
- Endpoint detection & Malware analysis software☆230Dec 20, 2019Updated 6 years ago
- Data exfiltration utility for testing detection capabilities☆56Jan 13, 2022Updated 4 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆521Nov 26, 2022Updated 3 years ago
- Simple Backdoor Manager with Python (based on weevely)☆96Feb 27, 2025Updated last year
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆936May 28, 2025Updated 10 months ago