Statistics for topic backdoor
RepositoryStats tracks 607,679 Github repositories, of these 147 are tagged with the backdoor topic. The most common primary language for repositories using this topic is Python (47). Other languages include: C (29), C# (12), PHP (12), C++ (11)
Stargazers over time for topic backdoor
Most starred repositories for topic backdoor (view more)
Trending repositories for topic backdoor (view more)
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then ...
Open-Source Remote Administration Tool For Windows C# (RAT)
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target ser...
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Open-Source Remote Administration Tool For Windows C# (RAT)
Customizable Linux Persistence Tool for Security Research and Detection Engineering.
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then ...
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
Customizable Linux Persistence Tool for Security Research and Detection Engineering.
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target ser...
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then ...
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via a netcat-like session. This tool is designed to work on both Li...
Marlowe Malwares is a comprehensive repository dedicated to the aggregation, analysis, and management of malware samples written in various programming languages.
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increas...
BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models
Customizable Linux Persistence Tool for Security Research and Detection Engineering.
Notorious Smartphones Malware for Remote administrator, including Advanced Spyware functions. EXECUTE iOS and Android, their Sandbox and SSL Integration.
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target ser...
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then ...
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
Customizable Linux Persistence Tool for Security Research and Detection Engineering.
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target ser...
BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface and VirusTotal integration. Subscribe to get API Key