backdoor
Here are 68 public repositories matching this topic...
Persistent & Undetectable Malware Backdoor
-
Updated
May 8, 2024 - C
XZ backdoor reverse engineering
-
Updated
May 6, 2024 - C
A simple, persisent windows backdoor
-
Updated
May 5, 2024 - C
A simple C program with stubs, allowing one to dynamically debug the backdoor included in liblzma
-
Updated
Apr 1, 2024 - C
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
-
Updated
Mar 17, 2024 - C
C2 extensible for post-explotation and remote control
-
Updated
Mar 4, 2024 - C
Tiny SHell - An open-source UNIX backdoor (I'm not the author!)
-
Updated
Feb 20, 2024 - C
EternalHush - new free advanced open-source c2 framework
-
Updated
Oct 28, 2023 - C
unlock the advanced menu of Lenovo Yoga Slim 7 BIOS
-
Updated
Oct 8, 2023 - C
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
-
Updated
Sep 22, 2023 - C
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
-
Updated
Sep 20, 2023 - C
ADR is a trojan that retrieves all information on the computer and all data stored in applications using chormuim. It recovers cookies, tokens, passwords and saved bank cards. This malware is undetectable by Windows Defender, Chrome, Virustotal (4/71).
-
Updated
Sep 5, 2023 - C
Improve this page
Add a description, image, and links to the backdoor topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the backdoor topic, visit your repo's landing page and select "manage topics."