Browsing category

Backdoors

Koadic – C3 COM Command & Control – JScript RAT

Koadic, or COM Command & Control, is a Windows post-exploitation rootkit similar to other penetration testing tools such as Meterpreter and Powershell Empire. The major difference is that Koadic does most of its operations using Windows Script Host (a.k.a. JScript/VBScript), with compatibility in the core to support a default installation of Windows 2000 with no […]

TrevorC2 – Command and Control via Legitimate Behavior over HTTP

TrevorC2 is a client/server model for masking command and control through a normally browsable website. Detection becomes much harder as time intervals are different and does not use POST requests for data exfil. There are two components to TrevorC2 – the client and the server. The client can be configured to be used with anything. […]

Androspy – Backdoor Crypter & Creator With Automatic IP Poisener

Androspy – Backdoor Crypter & Creator With Automatic IP Poisener Dependencies keytool jarsigner Apache2 Metasploit-Framework xterm Installation sudo apt-get install git git clone https://github.com/TunisianEagles/Androspy.git cd Androspy chmod +x setup.sh sudo ./setup.sh chmod +x androspy.sh sudo ./androspy.sh Tested on : BackBox Linux Kali linux Parrot os Contact Contact – Tunisian Eagles [Email] – tunisianeagles@protonmail.com – TunisianEagles […]

WinSpy – A Windows Reverse Shell Backdoor Creator With An Automatic IP Poisener

WinSpy: Windows Reverse Shell Backdoor Creator With ip poisener. Dependencies 1 – metasploit-framework 2 – xterm 3 – apache2 4 – whiptail Installation sudo apt-get install git git clone https://github.com/TunisianEagles/winspy.git cd winspy chmod +x setup.sh ./setup.sh chmod +x winspy.sh ./winspy.sh Tested on : BackBox Linux Kali linux Parrot os Tutorial Contact Contact – Belahsan Ouerghi […]

Door404 – PHP Backdoor For Web Servers

Door404 is Open Source PHP Backdoor For Web Servers Developed By MrSqar & Rizer This Project Developed For 2 Reasons First ” Help Beginners to learn coding . “ Second ” Help Newbie Servers Managers To Learn New Protection Tricks “   Requirements PHP PHP CUrl OS Linux Screen Shots   Video : Download

Cloak – An Intelligent Python Backdoor Framework

Cloak generates a Python payload via msfvenom and then intelligently injects it into the python script you specify. o evade basic detection, Cloak breaks the payload into several parts and places it in different places in the code. If you want the victim to run your injected script as root, Cloak can handle that too. […]

SMBetray – Backdooring and Breaking Signatures

The goal of this tool is to switch the aim of MiTM on SMB from attacking the server through relayed connections, to attacking the client through malicious files and backdoored/replaced data when the opportunity strikes. In SMB connections, the security mechanisms protecting the integrity of the data passed between the server and the client are […]

GhostTunnel – Covert Backdoor Transmission Method

GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment. It can attack the target through the HID device only to release the payload (agent), then the HID device can be removed after the payload is released. GhostTunnel use 802.11 Probe Request Frames and Beacon Frames to communicate and doesn’t […]

Backdoorme – Powerful Auto-Backdooring Utility

BackdoorMe is a powerful auto-backdooring utility that you can use to keep a backdoor access to a computer. Note: BackdoorMe is not a tool to gain root access – only keep that access once it has been gained. BackdoorMe is split into two parts: backdoors and modules. Backdoors are small snippets of code which listen on […]

BEURK – Experimental Unix RootKit

BEURK is a userland preload rootkit for GNU/Linux, heavily focused around anti-debugging and anti-detection. Features: Hide attacker files and directories Realtime log cleanup (on utmp/wtmp) Anti process and login detection Bypass unhide, lsof, ps, ldd, netstat analysis Furtive PTY backdoor client Usage: Compile git clone https://github.com/unix-thrust/beurk.git cd beurk make Install scp libselinux.so root@victim.com:/lib/ ssh root@victim.com […]

Weevely – Weaponized Web Shell

Weevely is a stealth PHP web shell that is designed for remote server administration and penetration testing. It simplifies the administration of your web account, especially with unprivileged accounts such as free hosting services and other shared environments. It is an essential tool for post exploitation tasks like privilege escalation and access maintained even in […]

JSRAT – Javascript Backdoor to Control Victim Machine

JSRAT is a python Script that can be used to get a remote shell of victim pc. Installation & Setup :- Download the JSRAT tool Here Download and give appropriate permission to execute the script.Above figure shows the complete installation Starting the web server: Run and execute the command: python JSRAT.py -i <kali Linux or Attacker Ip> -p […]

DNS Shell – Tool to Compromise and Maintain control Over Victim Machine

DNS protocol runs on the application layer of TCP/IP Model. When an attacker or pentester tries to exploit DNS with RCE vulnerability (Remote Command Execution) destination server acts as the backdoor. DNS Shell Tool is python based exploitation tool to compromise and also maintaining the access via command and control to the server. Here we have used Kali Linux(Attacker […]

backdoorppt – Transform your payload.exe into one fake word doc

Simple script that allow users to add a ms-word icon to one existing executable.exe (using resource-hacker as backend appl) and a ruby one-liner command that will hidde the .exe extension and add the word doc .ppt extension to the end of the file name. Version release: v1.5-Stable Distros Supported: Linux Kali, Ubuntu, Mint Author: pedro […]

Chromebackdoor – Backdoor C&C for Populars Browsers

Chromebackdoor is a pentest tool, this tool uses a MITB technique to generate a windows executable “.exe”, after launch, it runs a malicious extension or script on most popular browsers, and send all DOM datas on command and control. VIDEO Install Text (V 3.0) Install Video (OLD) Binder guide Module guide Form grabber plugins Facebook […]

SideDoor – Debian/Ubuntu Backdoor Using A Reverse SSH Tunnel

Sidedoor maintains a reverse tunnel to provide a backdoor. sidedoor can be used to remotely control a device behind a NAT. Sidedoor is packaged for Debian-based systems with systemd or upstart. It has been used on Debian 8 (jessie) and Ubuntu 14.04 LTS (trusty). The sidedoor user has full root access configured in /etc/sudoers.d. If […]