Compilation of files recovered from compromised hosts. This collection contains various scripts and tools used by the attackers.
-
Updated
Jul 18, 2017 - Perl
Compilation of files recovered from compromised hosts. This collection contains various scripts and tools used by the attackers.
Repository with rooting tools, rooting apps, root validators, and more.
A simple but dangerous backdoor built as a kernel module.
Introducing backdoors in neural networks through parameter-level manipulation.
Outil d’obscurcissement simple
.Venom-Back adalah backdoor yg sangat berbahaya
Implementations and demo of a regular Backdoor and a Latent backdoor attack on Deep Neural Networks.
I improved the quasard stub so that it is less detectable... Normally it bypasses avast and AVG in the long term.
A collection of useful scripts and stuff for pentesting
Created by Haku Simple backdoor with python3. Feature: -Open Port Checker -Socket Backdoor Linux & Windows
Computer architecture course project
I just wanted to take a look inside public webshells and play with it :)
Useful netcat commands such as Reverse Shells, Port Relays via FIFO, and others stuff.
Add a description, image, and links to the backdoors topic page so that developers can more easily learn about it.
To associate your repository with the backdoors topic, visit your repo's landing page and select "manage topics."