wumb0 / SimpleBackdoorLinks
Simple windows backdoor command shell.
☆20Updated 8 years ago
Alternatives and similar repositories for SimpleBackdoor
Users that are interested in SimpleBackdoor are comparing it to the libraries listed below
Sorting:
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆47Updated 5 years ago
- Ring3 Rootkit Backdoor.☆43Updated 10 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 9 years ago
- https://blog.xpnsec.com/windows-warbird-privesc/☆31Updated 8 years ago
- DLL Injection Library & Tools☆73Updated 9 years ago
- ☆36Updated 6 years ago
- ☆54Updated 8 years ago
- CAPE monitor DLLs☆41Updated 6 years ago
- ☆46Updated 7 years ago
- Source code of my KeygenMe V7 challenge☆22Updated 7 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 11 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Updated 8 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆37Updated 10 years ago
- Miscellanous scripts used for malware analysis☆23Updated 7 years ago
- Rootkit Arsenal 2nd Source Code☆15Updated 12 years ago
- ☆13Updated 9 years ago
- public bugs/proof of concepts☆50Updated 4 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆45Updated 6 years ago
- ☆28Updated 9 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 4 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- ☆24Updated 6 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 4 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆14Updated 6 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Updated 7 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆37Updated 12 years ago
- Build a Jekyll blog in minutes, without touching the command line.☆16Updated 7 years ago
- ☆24Updated 7 years ago
- My Shellcode Archive☆29Updated 8 years ago