Trending repositories for topic backdoor
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then ...
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
For educational purposes only, samples of old & new malware builders including screenshots!
Open-Source Remote Administration Tool For Windows C# (RAT)
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target ser...
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
PCI Express DIY hacking toolkit for Xilinx SP605. This repository is also home of Hyper-V Backdoor and Boot Backdoor, check readme for links and info
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Single PHP file to detect potentially malicious threats based on token and hash with web interface and VirusTotal integrations
/root/.ssh/authorized_keys evil file watchdog with ebpf tracepoint hook.
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target ser...
Single PHP file to detect potentially malicious threats based on token and hash with web interface and VirusTotal integrations
For educational purposes only, samples of old & new malware builders including screenshots!
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
/root/.ssh/authorized_keys evil file watchdog with ebpf tracepoint hook.
PCI Express DIY hacking toolkit for Xilinx SP605. This repository is also home of Hyper-V Backdoor and Boot Backdoor, check readme for links and info
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then ...
Open-Source Remote Administration Tool For Windows C# (RAT)
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then ...
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target ser...
For educational purposes only, samples of old & new malware builders including screenshots!
PCI Express DIY hacking toolkit for Xilinx SP605. This repository is also home of Hyper-V Backdoor and Boot Backdoor, check readme for links and info
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Single PHP file to detect potentially malicious threats based on token and hash with web interface and VirusTotal integrations
KIZAGAN is a RAT,c2 command&control tool.It allows you to build executables and control infected machines.
pwn++ is a Windows & Linux library oriented for exploit dev and used to play with Modern C++ (17->26)
Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target ser...
Single PHP file to detect potentially malicious threats based on token and hash with web interface and VirusTotal integrations
KIZAGAN is a RAT,c2 command&control tool.It allows you to build executables and control infected machines.
For educational purposes only, samples of old & new malware builders including screenshots!
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
pwn++ is a Windows & Linux library oriented for exploit dev and used to play with Modern C++ (17->26)
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
PCI Express DIY hacking toolkit for Xilinx SP605. This repository is also home of Hyper-V Backdoor and Boot Backdoor, check readme for links and info
Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then ...
/root/.ssh/authorized_keys evil file watchdog with ebpf tracepoint hook.
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
First open source and publicly available System Management Mode backdoor for UEFI based platforms. Good as general purpose playground for various SMM experiments.
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target ser...
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then ...
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target ser...
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Open-Source Remote Administration Tool For Windows C# (RAT)
For educational purposes only, samples of old & new malware builders including screenshots!
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
PCI Express DIY hacking toolkit for Xilinx SP605. This repository is also home of Hyper-V Backdoor and Boot Backdoor, check readme for links and info
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
AMWScan (PHP Antimalware Scanner) is a free tool to scan php files and analyze your project to find any malicious code inside it.
:ghost: RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen c...
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target ser...
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increas...
👁️ Modded Program for remote control of windows computers via telegram bot. Written in C#
For educational purposes only, samples of old & new malware builders including screenshots!
Single PHP file to detect potentially malicious threats based on token and hash with web interface and VirusTotal integrations
Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
pwn++ is a Windows & Linux library oriented for exploit dev and used to play with Modern C++ (17->26)
Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3
A curated list of papers & resources on backdoor attacks and defenses in deep learning.
For educational purposes only, samples of old & new malware builders including screenshots!
Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target ser...
Single PHP file to detect potentially malicious threats based on token and hash with web interface and VirusTotal integrations
Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board
Improper Authorization Vulnerability in Confluence Data Center and Server + bonus 🔥
no1seAndroRAT is a remote access tool that utilizes msfvenom and apktool, all in one script for your convenience.
👁️ Modded Program for remote control of windows computers via telegram bot. Written in C#
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increas...
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then ...
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Open-Source Remote Administration Tool For Windows C# (RAT)
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
For educational purposes only, samples of old & new malware builders including screenshots!
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero and Hak5 USB Rubber Ducky, and changes its signature after every ...
:ghost: RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Browser Protector against various stealers, written in C# & C/C++.
Statically-linked ssh server with reverse shell functionality for CTFs and such
A curated list of trustworthy deep learning papers. Daily updating...
SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)
Browser Protector against various stealers, written in C# & C/C++.
Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target ser...
Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board
A curated list of papers & resources on backdoor attacks and defenses in deep learning.
POC for hikivison devices based on the following vulnerability https://www.exploit-db.com/exploits/44328
An ssh honeypot with the XZ backdoor. CVE-2024-3094
SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)
The BackDoor of HIPHP gives you the power to control websites based on PHP using HTTP/HTTPS protocol. By sending files, tokens and commands through port 80's POST/GET method, users can access a range ...
FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning [ICLR‘23, Best Paper Award at ECCV’22 AROW Workshop]
A Remote Administration Tool (RAT) for Windows written in C++ with a fancy C.L.I.
A webshell that can bypass some system security, all code has been obfuscated to bypass malware scans freely.
Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero and Hak5 USB Rubber Ducky, and changes its signature after every ...
A curated list of trustworthy deep learning papers. Daily updating...