Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for security backdoor
backdoor
x
security
x
34 search results found
Nishang
⭐
7,771
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
Diamorphine
⭐
1,639
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
Triplecross
⭐
1,381
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
Gsocket
⭐
1,271
Connect like there is no firewall. Securely.
Reverse Ssh
⭐
672
Statically-linked ssh server with reverse shell functionality for CTFs and such
Fireelf
⭐
620
fireELF - Fileless Linux Malware Framework
Awesome Trustworthy Deep Learning
⭐
254
A curated list of trustworthy deep learning papers. Daily updating...
Rspet
⭐
251
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Backdoors101
⭐
231
Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.
Sks
⭐
209
Security Knowledge Structure(安全知识汇总)
Reveng_rtkit
⭐
181
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
Nomorecookies
⭐
145
Browser Protector against various stealers, written in C# & C/C++.
Hg8045q
⭐
98
Pwning the Nuro issued Huawei HG8045Q
Father
⭐
79
LD_PRELOAD rootkit
Pandora
⭐
78
Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.
Shelly
⭐
77
Simple Backdoor Manager with Python (based on weevely)
Backdoor
⭐
66
Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and Privacy 2019.
Recmd
⭐
48
Remote Command executor
Mimicry
⭐
46
Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.
Pingoor
⭐
43
「🚪」Linux Backdoor based on ICMP protocol
Xbackdoor
⭐
34
A tool for the persistent XSS exploitation with a focus for mobile web browsers
Input Aware Backdoor Attack Release
⭐
27
Input-aware Dynamic Backdoor Attack (NeurIPS 2020)
Keyplexer
⭐
25
Capstone: Keylogger Trojan
Honest
⭐
24
Are your installed packages _really_ the same as you saw on GitHub?
Flip
⭐
24
FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning [ICLR‘23, Best Paper Award at ECCV’22 AROW Workshop]
Rust Backdoors
⭐
15
More bind and reverse shells! This time written in Rust.
Passwordchangenotify
⭐
12
when pass change ,send the pass to remote host
Coyote
⭐
11
Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagements.
Rootkit
⭐
10
This project has been done with Chen as part of system security course at SBU CS.
Fud Reverse Shell
⭐
9
Undetected Reverse Shell
Shadowduck
⭐
8
ShadowDuck - Reverse http interactive shell
Php 8.1.0 Dev Backdoor Rce
⭐
7
PHP 8.1.0-dev Backdoor System Shell Script
Sa Secure Audit Rkhunter
⭐
5
rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing SHA-1 hashes of important files with known good ones in online databases, searching for default directories (of rootkits), wrong permissions, hidden files, suspicious strings in kernel modules, and special tests for Linux and FreeBSD.
Hansipy
⭐
5
apache log access analyzer
Related Searches
Security Vulnerabilities (11,840)
Laravel Security (11,580)
Php Security (10,611)
Java Security (2,469)
Html Security (2,284)
Python Security (1,733)
Golang Security (1,316)
Shell Security (1,213)
Security Penetration Testing (920)
C Security (886)
1-34 of 34 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.