All Projects → BackToMe → Similar Projects or Alternatives

551 Open source projects that are alternatives of or similar to BackToMe

MSBackdoor
[Discontinued] Transform your payload into fake powerpoint (.ppt)
Stars: ✭ 35 (-42.62%)
Mutual labels:  backdoor, backdoors
Sifter
Sifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (+560.66%)
xeca
PowerShell payload generator
Stars: ✭ 103 (+68.85%)
Oscp Pentest Methodologies
备考 OSCP 的各种干货资料/渗透测试干货资料
Stars: ✭ 166 (+172.13%)
Phpsploit
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+1847.54%)
Mutual labels:  backdoor, post-exploitation
Mouse
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (+204.92%)
Mutual labels:  backdoor, post-exploitation
TG799VAC-XTREME-17.2-MINT
My personal unique wiki for hacking the router firmware used by (Telia)TG799vac Xtream v17.2-MINT delivered from Technicolor
Stars: ✭ 71 (+16.39%)
Mutual labels:  backdoor, backdoors
Evilosx
An evil RAT (Remote Administration Tool) for macOS / OS X.
Stars: ✭ 1,826 (+2893.44%)
Mutual labels:  backdoor, post-exploitation
reverse-ssh
Statically-linked ssh server with reverse shell functionality for CTFs and such
Stars: ✭ 548 (+798.36%)
Mutual labels:  backdoor, penetration-testing
Pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Stars: ✭ 6,737 (+10944.26%)
Mutual labels:  backdoor, post-exploitation
Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 478 (+683.61%)
Mutual labels:  backdoor, post-exploitation
PyIris
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+385.25%)
Mutual labels:  backdoor, payload-generator
Intersect 2.5
Post-Exploitation Framework
Stars: ✭ 59 (-3.28%)
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+1526.23%)
Mutual labels:  backdoor, post-exploitation
Hrshell
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (+216.39%)
MsfMania
Python AV Evasion Tools
Stars: ✭ 388 (+536.07%)
Mutual labels:  backdoor, fud
Punk.py
unix SSH post-exploitation 1337 tool
Stars: ✭ 107 (+75.41%)
Proton
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (+132.79%)
Mutual labels:  backdoor, post-exploitation
Hacker Roadmap
📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+12608.2%)
Discover
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.
Stars: ✭ 2,548 (+4077.05%)
Lscript
The LAZY script will make your life easier, and of course faster.
Stars: ✭ 3,056 (+4909.84%)
Powershell Rat
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+942.62%)
Mutual labels:  backdoor, penetration-testing
YAPS
Yet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-42.62%)
Mutual labels:  backdoor, penetration-testing
Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 601 (+885.25%)
Mutual labels:  backdoor, post-exploitation
Rspet
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Stars: ✭ 251 (+311.48%)
Mutual labels:  backdoor, post-exploitation
RSB-Framework
Windows/Linux - ReverseShellBackdoor Framework
Stars: ✭ 44 (-27.87%)
Mutual labels:  backdoor, backdoors
Thoron
Thoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (+42.62%)
Mutual labels:  backdoor, post-exploitation
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Stars: ✭ 1,934 (+3070.49%)
Mutual labels:  backdoor, post-exploitation
BURN
[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
Stars: ✭ 13 (-78.69%)
MacOS-WPA-PSK
PoC script showing that MacOS leaves the wireless key in NVRAM, in plaintext and accessible to anyone.
Stars: ✭ 29 (-52.46%)
Mutual labels:  post-exploitation
OffensiveAutoIt
Offensive tooling notes and experiments in AutoIt v3 (https://www.autoitscript.com/site/autoit/)
Stars: ✭ 341 (+459.02%)
Mutual labels:  post-exploitation
TokenBreaker
JSON RSA to HMAC and None Algorithm Vulnerability POC
Stars: ✭ 51 (-16.39%)
Mutual labels:  penetration-testing
SQLi-Query-Tampering
SQLi Query Tampering extends and adds custom Payload Generator/Processor in Burp Suite's Intruder. This extension gives you the flexibility of manual testing with many powerful evasion techniques.
Stars: ✭ 123 (+101.64%)
Mutual labels:  payload-generator
argus
Argus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (+42.62%)
Mutual labels:  penetration-testing
AutoPentest-DRL
AutoPentest-DRL: Automated Penetration Testing Using Deep Reinforcement Learning
Stars: ✭ 196 (+221.31%)
Mutual labels:  penetration-testing
Ashok
Ashok is a OSINT Recon Tool , a.k.a 😍 Swiss Army knife .
Stars: ✭ 109 (+78.69%)
Mutual labels:  penetration-testing
XENA
XENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring secrecy and resiliency over performance. It's micro-service oriented allowing for specialization and lower footprint. Join the community of the ulti…
Stars: ✭ 127 (+108.2%)
Mutual labels:  post-exploitation
adduser-dll
Simple DLL that add a user to the local Administrators group
Stars: ✭ 48 (-21.31%)
Mutual labels:  backdoor
sudo sniff
Steal user's password when running sudo for post-exploitation purposes
Stars: ✭ 26 (-57.38%)
Mutual labels:  post-exploitation
anubis
Captive wifi hotspot bypass tool for Linux
Stars: ✭ 46 (-24.59%)
Mutual labels:  penetration-testing
ggtfobins
Get GTFOBins info about a given exploit from the command line
Stars: ✭ 27 (-55.74%)
Mutual labels:  penetration-testing
Offensive-Security-Cayuqueo
Scripts usados en mi formación de Offensive Security por medio de la suscripción Learn Unlimited
Stars: ✭ 14 (-77.05%)
Mutual labels:  penetration-testing
Defeat-Defender-V1.2
Powerful batch script to dismantle complete windows defender protection and even bypass tamper protection ..Disable Windows-Defender Permanently....Hack windows. POC
Stars: ✭ 885 (+1350.82%)
Mutual labels:  fud
TIWAP
Totally Insecure Web Application Project (TIWAP)
Stars: ✭ 137 (+124.59%)
Mutual labels:  penetration-testing
Alfred
A friendly Toolkit for Beginner CTF players
Stars: ✭ 39 (-36.07%)
Mutual labels:  penetration-testing
Dark-Phish
Dark-Phish is a complete phishing tool. For more about Dark-Phish tool please visit the website.
Stars: ✭ 57 (-6.56%)
Mutual labels:  penetration-testing
Backdoor
A backdoor that runs on Linux and Windows
Stars: ✭ 36 (-40.98%)
Mutual labels:  backdoor
teatime
An RPC attack framework for Blockchain nodes.
Stars: ✭ 88 (+44.26%)
Mutual labels:  penetration-testing
Red-Rabbit-V4
The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate other peoples tools like the aircrack suite or the wifite framework, it rather has its own code and is raw source with over 270+ options. This framework might just be your everyday key to your workflow
Stars: ✭ 123 (+101.64%)
Mutual labels:  penetration-testing
pentest-tools
General stuff for pentesting - password cracking, phishing, automation, Kali, etc.
Stars: ✭ 52 (-14.75%)
Mutual labels:  penetration-testing
BackHAck
Backdoor Generator | Linux & Windows | FUD AV .py .exe
Stars: ✭ 61 (+0%)
Mutual labels:  backdoor
FYI
My last 10 year's material collection on offensive & defensive security, GRC, risk management, technical security guidelines and much more.
Stars: ✭ 194 (+218.03%)
Mutual labels:  penetration-testing
packetevents
PacketEvents is a powerful packet library. Our packet wrappers are efficient and easy to use. We support many protocol versions. (1.8+)
Stars: ✭ 235 (+285.25%)
Mutual labels:  listener
spydriver
🕵️ Lightweight utility to intercept WebDriver and WebElement method calls.
Stars: ✭ 24 (-60.66%)
Mutual labels:  listener
cent
Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one place
Stars: ✭ 315 (+416.39%)
Mutual labels:  penetration-testing
SBD
Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.
Stars: ✭ 23 (-62.3%)
Mutual labels:  post-exploitation
auto-recon-ng
Automated script to run all modules for a specified list of domains, netblocks or company name
Stars: ✭ 17 (-72.13%)
Mutual labels:  penetration-testing
backcookie
Small backdoor using cookie.
Stars: ✭ 49 (-19.67%)
Mutual labels:  backdoor
rpc2socks
Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.
Stars: ✭ 126 (+106.56%)
Mutual labels:  post-exploitation
penework
Penetration Test Framwork
Stars: ✭ 24 (-60.66%)
Mutual labels:  penetration-testing
1-60 of 551 similar projects