Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for backdoor post exploitation
backdoor
x
post-exploitation
x
16 search results found
Pupy
⭐
7,889
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
Ghost
⭐
2,400
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Evilosx
⭐
2,115
An evil RAT (Remote Administration Tool) for macOS / OS X.
Phpsploit
⭐
2,000
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Vegile
⭐
694
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Covertutils
⭐
412
A framework for Backdoor development!
Adbwebkit
⭐
351
ADB For Hackers (:
Rspet
⭐
251
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Sshimpanzee
⭐
211
SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)
Eternalhushframework
⭐
167
EternalHush - new free advanced open-source c2 framework
Pythonrat
⭐
92
Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3
Ldap Credentials Collector Backdoor Generator
⭐
50
This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.
Backtome
⭐
50
Little tool made in python to create payloads for Linux, Windows and OSX with unique handler
Uzi
⭐
25
A Distinctive Ransomeware.
Coyote
⭐
11
Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagements.
C_keylogger
⭐
8
Stealthy Windows keylogger written in C which uses a traditional approach to logging keystrokes (Does not utilise WinAPI hooks)
Related Searches
Python Backdoor (292)
1-16 of 16 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.