Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.
Comprehensive Guide to Malware Types: Understanding and Defending Against Cyber Threats
Introduction
Malware is one of the most persistent threats in cybersecurity, and it continues to evolve in complexity. With new strains and attack methods constantly emerging, understanding the types of...
Sandman is a NTP based backdoor for red team engagements in hardened networks.
Sandman is a backdoor that is meant to work on hardened networks during red team engagements.
Sandman works as a stager and leverages NTP (a protocol to sync time & date) to get and run an...
Powershell Backdoor Generator
Reverse backdoor written in Powershell and obfuscated with Python. Allowing the backdoor to have a new signature after every run. Also can generate auto run scripts for Flipper Zero and USB Rubber Ducky.
Features
Hak5 Rubber Ducky payload
Flipper Zero...
Obfuscated powershell reverse backdoor with Flipper Zero and USB Rubber Ducky payloads.
Reverse backdoor written in Powershell and obfuscated with Python. Allowing the backdoor to have a new signature after every run. Also can generate auto run scripts for Flipper Zero and USB Rubber Ducky...
Villain is a Windows & Linux backdoor generator and multi-session handler that allows users to connect with sibling servers (other machines running Villain) and share their backdoor sessions, handy for working as a team.
The main idea behind the payloads generated by this tool is inherited...
Sandman is a backdoor that is meant to work on hardened networks during red team engagements.
Sandman works as a stager and leverages NTP (a protocol to sync time & date) to get and run an arbitrary shellcode from a pre defined server.
Since NTP is a protocol that is overlooked by many...
Linux backdoor, rootkit, and eBPF bypass tools. Remote command execution over raw TCP.
Tested on Linux kernel 5.16
Tested on Linux kernel 5.17
Remote code execution over TCP (SSH, Nginx, Kubernetes, etc)
Network gateway bypass (bad checksums, TCP reset)
Self obfuscation at...
Summary
Gel4y Webshell is a backdoor built using the PHP programming language with the PHP procedural method in stealth mode where the file size will not exceed 15KB. Each function has been converted into a hex code to allow this webshell to penetrate the WAF (Firewall) server system.
Features...
This is a Backdoor, created with Python 3.
Types of Commands:
Downloading / Uploading files.
Launching / Deleting / Reading file's content.
Send messages.
Get a Snap from the Webcam / Screenshot.
Get UserID + Processes running.
Removing / Adding to Startup.
...
Some useful options
cls clear console.
--s {file or folder} search on disk. Use --v to verbose mode --s --v {file or folder}. To search with full path --s --ff {full path} (e.g --s --f C:/Web/*.txt).
--d {file} download file.
--t terminate ( Delete all logs and current backdoor )
--p...
Features
CMD - Command
Execute commands
Zone H Notifier
Mass/Single Mirror Site on Zone H Notifier
Back Connector
Reverse Shell with following payload (PHP, RUBY, PERL, PYTHON, NETCAT) credits to my friend bloos3rpent.
Mass Defacement
Mass deface sites all...
🎭 Naikon APT Group is now using Nebulae Backdoor 🎭
_________________________________
Hey Learners We Are Back with Another Awsm Things , And Sorry about discontinuing Consistency Of Articles
Naikon , A cyberespionage group from China, has been actively employing a new backdoor for multiple...
This is a python program backdoor embeded with a game for reverse connection from the victim to understand the use visit our youtube channel STRANGE LEARNINGS
Hidden content
Usage
1. change ip and port in backdoor.py and server.py
2. Run: python backdoor.py on target system
3. Run. python server.py in your local machine
Hidden content
A backdoor is a tool used to gain remote access to a machine.
Typically, backdoor utilities such as NetCat have 2 main functions: to pipe remote input into cmd or bash and output the response. This is useful, but it is also limited. BetterBackdoor overcomes these limitations by including the...
cross-platform backdoor using dns txt records
What is ddor?
ddor is a cross-platform lightweight backdoor that uses txt records to execute commands on infected machines.
Features
Allows a single txt record to have seperate commands for both Linux and Windows machines
List of around...
Arcane
Arcane is a simple script designed to backdoor iOS packages (iphone-arm) and create the necessary resources for APT repositories. It was created for this publication to help illustrate why Cydia repositories can be dangerous and what post-exploitation attacks are possible from a...
BetterBackdoor
A backdoor is a tool used to gain remote access to a machine.
Typically, backdoor utilities such as NetCat have 2 main functions: to pipe remote input into cmd or bash and output the response. This is useful, but it is also limited. BetterBackdoor overcomes these limitations by...
BetterBackdoor
A backdoor is a tool used to gain remote access to a machine.
Typically, backdoor utilities such as NetCat have 2 main functions: to pipe remote input into cmd or bash and output the response. This is useful, but it is also limited. BetterBackdoor overcomes these limitations by...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.