All Projects → h0nus → BackToMe

h0nus / BackToMe

Licence: other
Little tool made in python to create payloads for Linux, Windows and OSX with unique handler

Programming Languages

python
139335 projects - #7 most used programming language
shell
77523 projects

Projects that are alternatives of or similar to BackToMe

Thoron
Thoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (+42.62%)
Mutual labels:  backdoor, post-exploitation
Rspet
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Stars: ✭ 251 (+311.48%)
Mutual labels:  backdoor, post-exploitation
Evilosx
An evil RAT (Remote Administration Tool) for macOS / OS X.
Stars: ✭ 1,826 (+2893.44%)
Mutual labels:  backdoor, post-exploitation
Pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Stars: ✭ 6,737 (+10944.26%)
Mutual labels:  backdoor, post-exploitation
RSB-Framework
Windows/Linux - ReverseShellBackdoor Framework
Stars: ✭ 44 (-27.87%)
Mutual labels:  backdoor, backdoors
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+1526.23%)
Mutual labels:  backdoor, post-exploitation
Mouse
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (+204.92%)
Mutual labels:  backdoor, post-exploitation
YAPS
Yet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-42.62%)
Mutual labels:  backdoor, penetration-testing
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Stars: ✭ 1,934 (+3070.49%)
Mutual labels:  backdoor, post-exploitation
PyIris
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+385.25%)
Mutual labels:  backdoor, payload-generator
Powershell Rat
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+942.62%)
Mutual labels:  backdoor, penetration-testing
Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 601 (+885.25%)
Mutual labels:  backdoor, post-exploitation
Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 478 (+683.61%)
Mutual labels:  backdoor, post-exploitation
Phpsploit
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+1847.54%)
Mutual labels:  backdoor, post-exploitation
TG799VAC-XTREME-17.2-MINT
My personal unique wiki for hacking the router firmware used by (Telia)TG799vac Xtream v17.2-MINT delivered from Technicolor
Stars: ✭ 71 (+16.39%)
Mutual labels:  backdoor, backdoors
Proton
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (+132.79%)
Mutual labels:  backdoor, post-exploitation
MsfMania
Python AV Evasion Tools
Stars: ✭ 388 (+536.07%)
Mutual labels:  backdoor, fud
reverse-ssh
Statically-linked ssh server with reverse shell functionality for CTFs and such
Stars: ✭ 548 (+798.36%)
Mutual labels:  backdoor, penetration-testing
xeca
PowerShell payload generator
Stars: ✭ 103 (+68.85%)
Mutual labels:  penetration-testing, payload-generator
BURN
[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
Stars: ✭ 13 (-78.69%)
Mutual labels:  penetration-testing, post-exploitation

BackToMe [UNSTABLE]


Little framework made in python to create payloads for Linux, Windows and OSX with unique handler.

INFOS

This little framework is intended to help pentesters/red teamers in creating FUD payloads with unique handler-listener

COMMANDS

  • getinfos | Get system infos. Ex: User,Kernel, OS,Architecture
  • getpartitions | Get sysem partitions and type. Ex: "/dev/sda1" "ext4"
  • newtwork | Get newtork infos about network. Ex: ifconfig (Linux&Osx) ipconfig (Windows)
  • windows-rdp | Try to enable RDP and creare a new user for it (Need admin privileges!)
  • enumerate-win | Get windows based os infos. Ex: some net actions and some info gathering actions
  • enumerate-linux | Get linux based os infos. Ex: ssh root acces enabled and some info gathering actions
  • drop into terminal | Try to get bash/cmd session with sockets.

EXTERNAL DEPENDENCIES

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].