Weevely is a web shell designed for post-exploitation purposes that can be extended over the network at runtime. Upload weevely PHP agent...
Evil Remote Administration Tool (RAT) for macOS/OS X Features Emulate a terminal instance Simple extendable module system No bot dependencies (pure python) Undetected by...
Necurs botnet malware emerging again with new set of futures to create a backdoor on victims machine to steal sensitive data and...
Newly discovered powerful & previously unknown backdoor using HackingTeam’s leaked Remote Control System (RCS) code to infect the thousands of victim around...
Trend Micro researchers have identified malicious Google Chrome and Microsoft Edge browser extension that is distributing backdoor to steal information from the...
A malicious Chrome and Edge Browser Extension delivers powerful backdoor to stealing information from the browsers and monitor the victim’s activities. A downloader...
Turla cyber espionage group leveraging Powerful Mosquito backdoor using open source exploitation framework Metasploit for an initial stage of the attack on the target...
Recently we saw an attempt to hide a back door in a code library, and today there is a new case. This...
Parat is a simple remote administration tool(RAT) written in python. Features Fully UnDetectable(FUD) Compatible with Telegram messanger Bypass windows User Account Control(UAC)...
The general perception about Apple devices is that they are protected from malware attacks by default which is not true at all...
Python based backdoor that uses Gmail to exfiltrate data as an e-mail attachment. This RAT will help someone during red team engagements...
CTS Labs’ researchers have warned that if you’re running an AMD Ryzen, Ryzen Pro, Ryzen Mobile or EPYC processor on your computer...
TopHat is inspired by metasploit’s capabilties of meterpreter however it was coded to generate a undetected encrypted backdoor using python. Usage: python...
Parat is a simple remote administration tool (RAT) written in python. Also you can read wiki! Change log: Compatible with both python...
“Chaos” gives attackers, and follow-on attackers, full control over infected boxes. A stealthy backdoor undetected by antimalware providers is giving unknown attackers complete...
Shodan is a search engine that lets the user find specific types of computers (webcams, routers, servers, etc.) connected to the internet...
A new Internet of Things (IoT) botnet campaign dubbed as DoubleDoor has been discovered by NewSky Security, which uses two exploits for...
Another day, another popular app compromised to drop backdoor and conduct cryptomining. Telegram Messenger’s critical zero-day flaw that according to Kaspersky Labs researchers...
This module takes one existing image.jpg and one payload.ps1 (input by user) and builds a new payload (agent.jpg.exe) that if executed it...
Vulnerability in Lenovo Devices Allows Attacker to Bypass Fingerprint Authentication and Gain Higher Privileges. In case you own a ThinkCentre, ThinkPad or...
Another day, another malware scam – This time, the pirated version of Fire and Fury book has been found infecting devices with...