All Projects → Pyiris Backdoor → Similar Projects or Alternatives

1042 Open source projects that are alternatives of or similar to Pyiris Backdoor

PyIris
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+104.14%)
SuperLibrary
Information Security Library
Stars: ✭ 60 (-58.62%)
Mutual labels:  cybersecurity, infosec, kali-linux
Spiderfoot
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+4646.21%)
Mutual labels:  infosec, reconnaissance, cybersecurity
targets
A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (-41.38%)
Mutual labels:  cybersecurity, infosec, reconnaissance
Thefatrat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Stars: ✭ 5,944 (+3999.31%)
Mutual labels:  kali-linux, trojan, backdoor
ToxicEye
👽 Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (+110.34%)
Mutual labels:  backdoor, trojan, keylogger
Autosetup
Auto setup is a bash script compatible with Debian based distributions to install and setup necessary programs.
Stars: ✭ 140 (-3.45%)
Mutual labels:  kali-linux, infosec, reconnaissance
Badkarma
network reconnaissance toolkit
Stars: ✭ 353 (+143.45%)
Mutual labels:  kali-linux, reconnaissance
Search That Hash
🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (+221.38%)
Mutual labels:  infosec, cybersecurity
Aviator
Antivirus evasion project
Stars: ✭ 529 (+264.83%)
Mutual labels:  trojan, backdoor
Powershell Rat
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+338.62%)
Mutual labels:  trojan, backdoor
Gitlab Watchman
Monitoring GitLab for sensitive data shared publicly
Stars: ✭ 127 (-12.41%)
Mutual labels:  infosec, cybersecurity
Stupidkeylogger
A Terrific Keystroke Recorder
Stars: ✭ 318 (+119.31%)
Mutual labels:  trojan, keylogger
Trojancockroach
A Stealthy Trojan Spyware
Stars: ✭ 424 (+192.41%)
Mutual labels:  trojan, keylogger
Webmap
WebMap-Nmap Web Dashboard and Reporting
Stars: ✭ 357 (+146.21%)
Mutual labels:  infosec, cybersecurity
Spaces Finder
A tool to hunt for publicly accessible DigitalOcean Spaces
Stars: ✭ 122 (-15.86%)
Mutual labels:  infosec, reconnaissance
Awesome Security Hardening
A collection of awesome security hardening guides, tools and other resources
Stars: ✭ 630 (+334.48%)
Mutual labels:  infosec, cybersecurity
Bigbountyrecon
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (+273.1%)
Mutual labels:  cybersecurity, reconnaissance
Wireshark Cheatsheet
Wireshark Cheat Sheet
Stars: ✭ 131 (-9.66%)
Mutual labels:  infosec, cybersecurity
Networm
Python network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-6.9%)
Mutual labels:  trojan, backdoor
Vuldash
Vulnerability Dashboard
Stars: ✭ 16 (-88.97%)
Mutual labels:  infosec, cybersecurity
Defaultcreds Cheat Sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+1244.14%)
Mutual labels:  infosec, cybersecurity
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+584.14%)
Mutual labels:  kali-linux, backdoor
Awesome Asset Discovery
List of Awesome Asset Discovery Resources
Stars: ✭ 1,017 (+601.38%)
Mutual labels:  infosec, reconnaissance
Lyricpass
Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security research.
Stars: ✭ 58 (-60%)
Mutual labels:  kali-linux, infosec
Malware Feed
Bringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-52.41%)
Mutual labels:  infosec, cybersecurity
Ghost
👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (+115.17%)
Mutual labels:  trojan, backdoor
Xxe Injection Payload List
🎯 XML External Entity (XXE) Injection Payload List
Stars: ✭ 304 (+109.66%)
Mutual labels:  infosec, cybersecurity
Natlas
Scaling Network Scanning. Changes prior to 1.0 may cause difficult to avoid backwards incompatibilities. You've been warned.
Stars: ✭ 333 (+129.66%)
Mutual labels:  infosec, reconnaissance
Phishapi
Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (+87.59%)
Mutual labels:  infosec, cybersecurity
Paradoxiarat
ParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 395 (+172.41%)
Mutual labels:  backdoor, keylogger
Buster
An advanced tool for email reconnaissance
Stars: ✭ 387 (+166.9%)
Mutual labels:  infosec, cybersecurity
Logkeys
📝 ⌨️ A GNU/Linux keylogger that works!
Stars: ✭ 518 (+257.24%)
Mutual labels:  cybersecurity, keylogger
Megplus
Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]
Stars: ✭ 268 (+84.83%)
Mutual labels:  infosec, reconnaissance
Chatter
internet monitoring osint telegram bot for windows
Stars: ✭ 123 (-15.17%)
Mutual labels:  infosec, cybersecurity
Keylogger
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (+316.55%)
Mutual labels:  cybersecurity, keylogger
Flux Keylogger
🔖 Modern Javascript keylogger with web panel
Stars: ✭ 122 (-15.86%)
Mutual labels:  kali-linux, keylogger
Tinkerershell
A simple python reverse shell written just for fun.
Stars: ✭ 62 (-57.24%)
Mutual labels:  backdoor, keylogger
Proton
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-2.07%)
Mutual labels:  kali-linux, backdoor
Apache Http Server Module Backdoor
👺 A Backdoor For Apache HTTP Server Written in C
Stars: ✭ 127 (-12.41%)
Mutual labels:  cybersecurity, backdoor
Rapidscan
🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+434.48%)
Mutual labels:  kali-linux, reconnaissance
Lime Rat
LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)
Stars: ✭ 663 (+357.24%)
Mutual labels:  trojan, backdoor
Remot3d
Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors
Stars: ✭ 263 (+81.38%)
Mutual labels:  trojan, backdoor
Checkmyhttps
We propose a user-friendly add-on that allows you to check if your encrypted web traffic (SSL/TLS) towards secured Internet servers (HTTPS) is not intercepted (being listened to).
Stars: ✭ 35 (-75.86%)
Mutual labels:  infosec, cybersecurity
Badusb botnet
👥😈 Infect a pc with badusb and establish a connection through telegram.
Stars: ✭ 32 (-77.93%)
Mutual labels:  infosec, keylogger
Awesome Cybersecurity Blueteam
💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Stars: ✭ 2,091 (+1342.07%)
Mutual labels:  infosec, cybersecurity
Ge.mine.nu
Code from my old page ge.mine.nu
Stars: ✭ 31 (-78.62%)
Mutual labels:  kali-linux, reconnaissance
Mitmap
📡 A python program to create a fake AP and sniff data.
Stars: ✭ 1,526 (+952.41%)
Mutual labels:  kali-linux, infosec
Dr0p1t Framework
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+680.69%)
Mutual labels:  kali-linux, backdoor
Gitmonitor
One way to continuously monitor sensitive information that could be exposed on Github
Stars: ✭ 115 (-20.69%)
Mutual labels:  cybersecurity, reconnaissance
Sudomy
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 859 (+492.41%)
Mutual labels:  kali-linux, reconnaissance
Thoron
Thoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-40%)
Mutual labels:  kali-linux, backdoor
Malice
VirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+764.14%)
Mutual labels:  infosec, cybersecurity
Awesome Nodejs Security
Awesome Node.js Security resources
Stars: ✭ 1,294 (+792.41%)
Mutual labels:  infosec, cybersecurity
Virtualseccons
An ongoing list of virtual cybersecurity conferences.
Stars: ✭ 113 (-22.07%)
Mutual labels:  infosec, cybersecurity
Prismatica
Responsive Command and Control System
Stars: ✭ 81 (-44.14%)
Mutual labels:  infosec, cybersecurity
Cvebase.com
cvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vulnerabilities & PoCs
Stars: ✭ 88 (-39.31%)
Mutual labels:  infosec, cybersecurity
Analyst Arsenal
A toolkit for Security Researchers
Stars: ✭ 112 (-22.76%)
Mutual labels:  infosec, cybersecurity
KeyPlexer
Capstone: Keylogger Trojan
Stars: ✭ 32 (-77.93%)
Mutual labels:  trojan, keylogger
Open-source-tools-for-CTI
Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (-37.24%)
Mutual labels:  cybersecurity, infosec
1-60 of 1042 similar projects