This Discord Rat give you the best way to control victims pc on discord.
-
Updated
Jun 15, 2024 - Python
This Discord Rat give you the best way to control victims pc on discord.
This repository contains a simple backdoor code example. The code is written in Python and is intended for educational purposes only. The code is not intended to be used for malicious purposes.
VySecator Is a Python Script Obfuscation Tool, Which can be used to Obfuscate your hand written Malwares and your Hand Written Scripts!
Red Script with Python
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
DarkSpy facilitates a secure and educational environment to comprehend the mechanics of establishing connections between two machines. The reverse shell enables controlled operations on the remote system, including executing shell commands, capturing screenshots, downloading files, uploading files, and more.
a virus project that uses discord as a reverse shell, has a lot of functions and is easy to use
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target server. It utilizes the wp-automatic plugin's CSV injection vulnerability to execute SQL queries
Backdoor to infect and target Linux and windows computers. ATTENTION!!! THE PROGRAM WAS CREATED FOR EDUCATIONAL PURPOSES. CODE TO BE USED ONLY BY EXPERIENCED PROGRAMMERS, PENTESTERS AND ETHICAL HACKERS!
The BackDoor of HIPHP gives you the power to control websites based on PHP using HTTP/HTTPS protocol. By sending files, tokens and commands through port 80's POST/GET method, users can access a range of activities such as downloading and editing files. It also allows for connecting to Tor networks with password protection for extra security.
Collaborative malware exchange repository.
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
his repository contains an implementation for eliminating backdoor triggers embedded in images, particularly addressing poison label attacks such as Trojan, BadNets, and Blend.
This is the implementation of the paper Regularization is the Key to Separate Backdoor Data.
xz-vulnerability-poc (cross platform) This repository contains a Proof of Concept (POC) script for the xz vulnerability
One line command and control backdoors for APIs and web applications.
Add a description, image, and links to the backdoor topic page so that developers can more easily learn about it.
To associate your repository with the backdoor topic, visit your repo's landing page and select "manage topics."