exploitingExploiting challenges in Linux and Windows
Stars: ✭ 122 (+154.17%)
Mutual labels: exploit, exploitation, exploit-development
RSB-FrameworkWindows/Linux - ReverseShellBackdoor Framework
Stars: ✭ 44 (-8.33%)
Mutual labels: backdoor, backdoorpython, backdooring
exploitsSome of my public exploits
Stars: ✭ 50 (+4.17%)
Mutual labels: exploit, exploitation
ImgbackdoorHide your payload into .jpg file
Stars: ✭ 87 (+81.25%)
Mutual labels: backdoor, exploit
MouseMouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (+287.5%)
Mutual labels: backdoor, exploit
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+1966.67%)
Mutual labels: backdoor, exploit
Pentest Tools FrameworkPentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
Stars: ✭ 48 (+0%)
Mutual labels: backdoor, exploit
Php Antimalware ScannerAMWScan (PHP Antimalware Scanner) is a free tool to scan php files and analyze your project to find any malicious code inside it.
Stars: ✭ 181 (+277.08%)
Mutual labels: backdoor, exploit
XxexploiterTool to help exploit XXE vulnerabilities
Stars: ✭ 243 (+406.25%)
Mutual labels: exploit, exploitation
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+85.42%)
Mutual labels: exploit, exploitation
Pentest Tools FrameworkPentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
Stars: ✭ 211 (+339.58%)
Mutual labels: backdoor, exploit
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+191.67%)
Mutual labels: exploit, exploitation
CloakCloak can backdoor any python script with some tricks.
Stars: ✭ 411 (+756.25%)
Mutual labels: backdoor, exploit
Remot3dRemot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors
Stars: ✭ 263 (+447.92%)
Mutual labels: backdoor, exploit
YAPSYet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-27.08%)
Mutual labels: backdoor, exploit
ThoronThoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (+81.25%)
Mutual labels: backdoor, exploit
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Stars: ✭ 1,934 (+3929.17%)
Mutual labels: backdoor, exploit
Ciscorv320dumpCVE-2019-1652 /CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!
Stars: ✭ 198 (+312.5%)
Mutual labels: exploit, exploitation
Cve 2019 9810Exploit for CVE-2019-9810 Firefox on Windows 64-bit.
Stars: ✭ 200 (+316.67%)
Mutual labels: exploit, exploitation
AndroratA Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Stars: ✭ 187 (+289.58%)
Mutual labels: backdoor, exploit