[go: up one dir, main page]

Showing 34 open source projects for "backdoor"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Deliver trusted data with dbt Icon
    Deliver trusted data with dbt

    dbt Labs empowers data teams to build reliable, governed data pipelines—accelerating analytics and AI initiatives with speed and confidence.

    Data teams use dbt to codify business logic and make it accessible to the entire organization—for use in reporting, ML modeling, and operational workflows.
    Learn More
  • 1
    opencv-mobile

    opencv-mobile

    The minimal opencv for Android, iOS, ARM Linux, Windows, Linux, MacOS

    ...We also provide prebuild binary package for iOS with bitcode enabled, that the official package lacks. All the binaries are compiled from source on GitHub action, no virus, no backdoor, no secret code.
    Downloads: 20 This Week
    Last Update:
    See Project
  • 2
    UACMe

    UACMe

    Defeating Windows user account control

    Run executable from command line, akagi32 [Key] [Param] or akagi64 [Key] [Param]. First parameter is a number of methods to use, second is an optional command (executable file name including full path) to run. The second parameter can be empty - in this case, the program will execute elevated cmd.exe from the system32 folder. Since 3.5.0 version all "fixed" methods are considered obsolete and removed altogether with all supporting code/units. If you still need them. This tool shows ONLY...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3
    SafeLine

    SafeLine

    Serve as a reverse proxy to protect your web services from attacks

    ...It typically protects web apps from attacks such as SQL injection, XSS, code injection, os command injection, CRLF injection, LDAP injection, XPath injection, RCE, XXE, SSRF, path traversal, backdoor, brute force, HTTP-flood, bot abuse, among others. By deploying a WAF in front of a web application, a shield is placed between the web application and the Internet. While a proxy server protects a client machine’s identity by using an intermediary, a WAF is a type of reverse-proxy, protecting the server from exposure by having clients pass through the WAF before reaching the server. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    USB Raptor

    USB Raptor

    Lock and unlock your computer using USB flash drives as keys

    Turn any USB flash drive to a computer lock and unlock key! USB Raptor can lock the system once a specific USB drive is removed from the computer and unlock when the drive is plugged in again to any USB port. The utility checks constantly the USB drives for the presence of a specific unlock file with encrypted content. If this specific file is found the computer stays unlocked otherwise the computer locks. To release the system lock user must plug the USB with the file in any USB port....
    Leader badge">
    Downloads: 1,674 This Week
    Last Update:
    See Project
  • Network Management Software and Tools for Businesses and Organizations | Auvik Networks Icon
    Network Management Software and Tools for Businesses and Organizations | Auvik Networks

    Mapping, inventory, config backup, and more.

    Reduce IT headaches and save time with a proven solution for automated network discovery, documentation, and performance monitoring. Choose Auvik because you'll see value in minutes, and stay with us to improve your IT for years to come.
    Learn More
  • 5
    OpenBLT

    OpenBLT

    Bootloader for STM32, XMC, HCS12 and other microcontroller targets.

    OpenBLT is mostly used as an STM32 bootloader, due to the popularity of STM32 microcontrollers. However, the bootloader’s architecture is such that it can work with any microcontroller and use any type of communication interface to perform firmware updates.
    Leader badge">
    Downloads: 50 This Week
    Last Update:
    See Project
  • 6
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    webshell

    webshell

    This is a webshell open source project

    ...Such as: asp, aspx, php, jsp, pl, py. Such as submitting various webshells, please do not change the name and password. All shells themselves do not guarantee whether there is a backdoor, but I will never add a backdoor deliberately when uploading by myself. Please don’t add a backdoor if you submit it. If you find backdoor code, please issue. The tools provided by this project are forbidden to engage in illegal activities. This project is for testing purposes only. All the consequences caused by it have nothing to do with me.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    phpsploit

    phpsploit

    Full-featured C2 framework which silently persists on webserver

    ...The obfuscated communication is accomplished using HTTP headers under standard client requests and web server's relative responses, tunneled through a tiny polymorphic backdoor. Detailed help for any option (help command) Cross-platform on both client and server. CLI supports auto-completion & multi-command. Session saving/loading feature & persistent history. Multi-request support for large payloads (such as uploads) Provides a powerful, highly configurable settings engine. Each setting, such as user-agent has a polymorphic mode. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Dominate AI Search Results Icon
    Dominate AI Search Results

    Generative Al is shaping brand discovery. AthenaHQ ensures your brand leads the conversation.

    AthenaHQ is a cutting-edge platform for Generative Engine Optimization (GEO), designed to help brands optimize their visibility and performance across AI-driven search platforms like ChatGPT, Google AI, and more.
    Learn More
  • 10
    TheFatRat

    TheFatRat

    Thefatrat a massive exploiting tool

    TheFatRat is an exploiting tool that compiles malware with a famous payload, and then the compiled malware can be executed on Linux, Windows, Mac, and Android. TheFatRat provides an easy way to create backdoors and payload which can bypass most anti-virus. This tool is for educational purposes only, usage of TheFatRat for attacking targets without prior mutual consent is illegal. Developers assume no liability and are not responsible for any misuse or damage caused by this program. This tool...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 11
    Cobado M6809 Micro BIOS/Server

    Cobado M6809 Micro BIOS/Server

    A Colour Computer (M6809) BIOS for interfacing to remote file systems

    Just for fun, I entered Cobado in the Retrochallenge Content. There are some great projects running: http://www.wickensonline.co.uk/retrochallenge-2012sc/rc201610-entrants-list/ Cobado is a "CoCo Backdoor BIOS". The idea is to run an ultra small generic BIOS on a Colour Computer which can be used to add full remote file access to a Windows system. The BIOS is under 255 bytes and fits into the cassette buffer. It hooks into the CoCo's line input (vector 12) and returns the command line to the server via the Becker port. The server is then able to take over the CoCo to provide any command set it chooses. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    windows sethc backdoor

    inserts backdoor into windows

    replaces sethc.exe, the stickeykeys command, with a copy of command prompt. this can be launched at any time by pressing shift five times or by pressing (alt+shift+prtsc)
    Downloads: 18 This Week
    Last Update:
    See Project
  • 13
    InternetExploiter
    ...Stay updadet here : https://www.facebook.com/pages/InternetExploiter/603567019785590?skip_nax_wizard=true&ref_type=logout_gear Exploit Windows PC´s fast and easy with an integradted Backdoor wich allows you to upload and download Files thrue a Command Line Prompt. This Project is actively developed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    myAuxiliary.rb

    myAuxiliary.rb

    msf post-exploitation auxiliary module

    This auxiliary module needs [metasploit] framework installed.. This module its a metasploit post-exploitation (after the targets get's exploited) auxiliary script, so we need to exploit a target first in order to use it. Affected platforms: Windows OS (all versions above windows vista) Read my WIKI for further info: https://sourceforge.net/p/myauxiliarymete/wiki/Home/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    bWAPP

    an extremely buggy web app !

    bWAPP, or a buggy web application, is a free and open source deliberately insecure web application. bWAPP helps security enthusiasts, developers and students to discover and to prevent web vulnerabilities. bWAPP prepares one to conduct successful penetration testing and ethical hacking projects. What makes bWAPP so unique? Well, it has over 100 web bugs! It covers all major known web vulnerabilities, including all risks from the OWASP Top 10 project. The focus is not just on one specific...
    Leader badge">
    Downloads: 1,485 This Week
    Last Update:
    See Project
  • 16
    SES Super-Encypherment Scrambler

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    SES brings back the uncrackable onetime pad, with a digital twist. It is well known that a random key of message-length is the only provably unbreakable cipher. SES uses cryptographic strength pseudo-random keys of message-length for its many encipherments, in addition to offering true one-time pad capability for the intrepid. SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996. SES now gives you the ability to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    RSR-winbackdoor

    rsr project : windows Backdoor

    rsr project : windows Backdoor ..
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    HFV (Hidden Folder Virus) Cleaner Pro

    HFV (Hidden Folder Virus) Cleaner Pro

    A Small Utility programmed to destroy Win32:Atraps-PZ[Trojan]

    ...Assuming these shortcuts as innocent, we launch them which in turn infects our PC or laptop with a virus which the geeks call Win32:Atraps-PZ[Trojan] Simply speaking, the shortcut creates a backdoor to your system so that it can access all your files,services and privileges within that system & all others connected to it without your permission. This is where HFV comes to help...Simply paste the location of your Infected directory on the box & click Delete virus to get rid of virus. As a safety precaution, keep this software backed up on system as well since the virus which hides all files and creates a shortcut can also hide this software as well. ...
    Downloads: 65 This Week
    Last Update:
    See Project
  • 19
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    Affliction X Cyber Shell Demo

    AFX Backdoor shell demonstration.

    Demo release of Affliction X webshell. Check us out on www.afflictionx.net
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    zBOT

    zBOT

    Python IRC Bot

    A very stable IRC bot written in Python.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    This script is to help pentester create a msfpayload faster with out haveing to remember swicthes i got 2 modes on this so far just create a regular encoded payload or to make or to inject Backdoor code into a existing exe for example notepad. explorer.exe
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Dan's PHP Backdoor

    This is a PHP backdoor that works on both *NIX and Windows.

    This initially started as a personal project but now that it's been included in Backtrack Linux I am taking it more seriously. While code revisions are going to be infrequent, this is where the documentation is and if you have found a bug please report it here.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    cymothoa

    Cymothoa is a stealth and lightweight backdooring tool.

    Cymothoa is a backdooring tool, that inject backdoor's shellcode directly into running applications. Stealth and lightweight...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 25
    The perfect PHP backdoor. Read more at http://infochive.blogspot.com/2011/06/dark-script-perfect-php-backdoor.html.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next