Trending repositories for topic backdoor
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then ...
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
Open-Source Remote Administration Tool For Windows C# (RAT)
Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen c...
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Open-Source Remote Administration Tool For Windows C# (RAT)
Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then ...
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen c...
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then ...
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Customizable Linux Persistence Tool for Security Research and Detection Engineering.
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Open-Source Remote Administration Tool For Windows C# (RAT)
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen c...
The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via a netcat-like session. This tool is designed to work on both Li...
TFRv2: Remote control access, used as a bypasser for anti-virus (software). Penetrate a FLAGSHIP such as Android, Windows, and macOS.
An Ounce of Notorious Smartphones Antler Bullet. Penetrate iOS and Android
:ghost: RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via a netcat-like session. This tool is designed to work on both Li...
Customizable Linux Persistence Tool for Security Research and Detection Engineering.
TFRv2: Remote control access, used as a bypasser for anti-virus (software). Penetrate a FLAGSHIP such as Android, Windows, and macOS.
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
An Ounce of Notorious Smartphones Antler Bullet. Penetrate iOS and Android
Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s
Browser Protector against various stealers, written in C# & C/C++.
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
The BackDoor of HIPHP gives you the power to control websites based on PHP using HTTP/HTTPS protocol. By sending files, tokens and commands through port 80's POST/GET method, users can access a range ...
Open-Source Remote Administration Tool For Windows C# (RAT)
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Demonized Shell is an Advanced Tool for persistence in linux.
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen c...
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then ...
Apache Tomcat auto WAR deployment & pwning penetration testing tool.
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then ...
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
Open-Source Remote Administration Tool For Windows C# (RAT)
Customizable Linux Persistence Tool for Security Research and Detection Engineering.
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen c...
An Ounce of Notorious Smartphones Antler Bullet. Penetrate iOS and Android
:ghost: RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
TFRv2: Remote control access, used as a bypasser for anti-virus (software). Penetrate a FLAGSHIP such as Android, Windows, and macOS.
The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via a netcat-like session. This tool is designed to work on both Li...
TFRv2: Remote control access, used as a bypasser for anti-virus (software). Penetrate a FLAGSHIP such as Android, Windows, and macOS.
An Ounce of Notorious Smartphones Antler Bullet. Penetrate iOS and Android
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models
A CLI Remote Administration Tool for administrating a network over a TCP connection. Extremely simple and modular containing over 30 commands.
👁️ Modded Program for remote control of windows computers via telegram bot. Written in C#
This script allows you to create a hidden admin account on your victim's PC.
Customizable Linux Persistence Tool for Security Research and Detection Engineering.
A python trojan with spyware, info stealing and ransomware abilities.
Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3
Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increas...
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target ser...
Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board
Customizable Linux Persistence Tool for Security Research and Detection Engineering.
An Ounce of Notorious Smartphones Antler Bullet. Penetrate iOS and Android
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target ser...
BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models
TFRv2: Remote control access, used as a bypasser for anti-virus (software). Penetrate a FLAGSHIP such as Android, Windows, and macOS.
The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via a netcat-like session. This tool is designed to work on both Li...
A CLI Remote Administration Tool for administrating a network over a TCP connection. Extremely simple and modular containing over 30 commands.
Marlowe Malwares is a comprehensive repository dedicated to the aggregation, analysis, and management of malware samples written in various programming languages.
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then ...
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
Customizable Linux Persistence Tool for Security Research and Detection Engineering.
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
Open-Source Remote Administration Tool For Windows C# (RAT)
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
An Ounce of Notorious Smartphones Antler Bullet. Penetrate iOS and Android
:ghost: RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Statically-linked ssh server with reverse shell functionality for CTFs and such
AMWScan (PHP Antimalware Scanner) is a free tool to scan php files and analyze your project to find any malicious code inside it.
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target ser...
BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models
The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via a netcat-like session. This tool is designed to work on both Li...
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increas...
Android malware source code dataset collected from public resources.
Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface and VirusTotal integration. Subscribe to get API Key
An ssh honeypot with the XZ backdoor. CVE-2024-3094
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
👁️ Modded Program for remote control of windows computers via telegram bot. Written in C#
Installs a persistent backdoor binary on android devices with unlocked bootloader via TWRP that runs as system daemon with root permissions and without SELinux restrictions
no1seAndroRAT is a remote access tool that utilizes msfvenom and apktool, all in one script for your convenience.
Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s
A python trojan with spyware, info stealing and ransomware abilities.