Trending repositories for topic backdoor
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Customizable Linux Persistence Tool for Security Research and Detection Engineering.
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
:ghost: RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then ...
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increas...
Threat Emulation and Red Teaming Framework, The Hacking Software for normal people.
Demonized Shell is an Advanced Tool for persistence in linux.
Open-Source Remote Administration Tool For Windows C# (RAT)
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increas...
Customizable Linux Persistence Tool for Security Research and Detection Engineering.
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
Threat Emulation and Red Teaming Framework, The Hacking Software for normal people.
:ghost: RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Demonized Shell is an Advanced Tool for persistence in linux.
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then ...
Open-Source Remote Administration Tool For Windows C# (RAT)
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then ...
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
Customizable Linux Persistence Tool for Security Research and Detection Engineering.
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increas...
:ghost: RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models
Demonized Shell is an Advanced Tool for persistence in linux.
PCI Express DIY hacking toolkit for Xilinx SP605. This repository is also home of Hyper-V Backdoor and Boot Backdoor, check readme for links and info
An Ounce of Notorious Smartphones Antler Bullet. Penetrate iOS and Android
Threat Emulation and Red Teaming Framework, The Hacking Software for normal people.
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
Open-Source Remote Administration Tool For Windows C# (RAT)
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increas...
BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
Customizable Linux Persistence Tool for Security Research and Detection Engineering.
An Ounce of Notorious Smartphones Antler Bullet. Penetrate iOS and Android
Demonized Shell is an Advanced Tool for persistence in linux.
Threat Emulation and Red Teaming Framework, The Hacking Software for normal people.
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
:ghost: RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
PCI Express DIY hacking toolkit for Xilinx SP605. This repository is also home of Hyper-V Backdoor and Boot Backdoor, check readme for links and info
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then ...
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen c...
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then ...
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Demonized Shell is an Advanced Tool for persistence in linux.
Customizable Linux Persistence Tool for Security Research and Detection Engineering.
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Open-Source Remote Administration Tool For Windows C# (RAT)
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
AMWScan (PHP Antimalware Scanner) is a free tool to scan php files and analyze your project to find any malicious code inside it.
Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s
:ghost: RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen c...
BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models
PCI Express DIY hacking toolkit for Xilinx SP605. This repository is also home of Hyper-V Backdoor and Boot Backdoor, check readme for links and info
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via a netcat-like session. This tool is designed to work on both Li...
Demonized Shell is an Advanced Tool for persistence in linux.
BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models
Anywhere is a powerful botnet that allows for the remote control of compromised devices
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
👁️ Modded Program for remote control of windows computers via telegram bot. Written in C#
Customizable Linux Persistence Tool for Security Research and Detection Engineering.
TFRv2: Remote control access, used as a bypasser for anti-virus (software). Penetrate a FLAGSHIP such as Android, Windows, and macOS.
An Ounce of Notorious Smartphones Antler Bullet. Penetrate iOS and Android
Android malware source code dataset collected from public resources.
POC for hikivison devices based on the following vulnerability https://www.exploit-db.com/exploits/44328
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increas...
AMWScan (PHP Antimalware Scanner) is a free tool to scan php files and analyze your project to find any malicious code inside it.
Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s
Browser Protector against various stealers, written in C# & C/C++.
[ICLR 2023, Best Paper Award at ECCV’22 AROW Workshop] FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning
Customizable Linux Persistence Tool for Security Research and Detection Engineering.
An Ounce of Notorious Smartphones Antler Bullet. Penetrate iOS and Android
BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target ser...
TFRv2: Remote control access, used as a bypasser for anti-virus (software). Penetrate a FLAGSHIP such as Android, Windows, and macOS.
The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via a netcat-like session. This tool is designed to work on both Li...
A CLI Remote Administration Tool for administrating a network over a TCP connection. Extremely simple and modular containing over 30 commands.
Marlowe Malwares is a comprehensive repository dedicated to the aggregation, analysis, and management of malware samples written in various programming languages.
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then ...
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
Customizable Linux Persistence Tool for Security Research and Detection Engineering.
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
Open-Source Remote Administration Tool For Windows C# (RAT)
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
An Ounce of Notorious Smartphones Antler Bullet. Penetrate iOS and Android
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
:ghost: RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Statically-linked ssh server with reverse shell functionality for CTFs and such
AMWScan (PHP Antimalware Scanner) is a free tool to scan php files and analyze your project to find any malicious code inside it.
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target ser...
BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models
The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via a netcat-like session. This tool is designed to work on both Li...
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increas...
Android malware source code dataset collected from public resources.
An ssh honeypot with the XZ backdoor. CVE-2024-3094
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
👁️ Modded Program for remote control of windows computers via telegram bot. Written in C#
Installs a persistent backdoor binary on android devices with unlocked bootloader via TWRP that runs as system daemon with root permissions and without SELinux restrictions
Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s
no1seAndroRAT is a remote access tool that utilizes msfvenom and apktool, all in one script for your convenience.
A python trojan with spyware, info stealing and ransomware abilities.
A curated list of papers & resources on backdoor attacks and defenses in deep learning.