Skip to content
#

backdoor

Here are 253 public repositories matching this topic...

sidahmed-malaoui
sidahmed-malaoui commented Apr 26, 2020

I used to launch pupy using the script ./start-compose.sh (like mentioned in your documentation). But it looks like this file no longer exists.

Did you remove this functionality ? If so can you plz remove it from the documentation ! If not, can you tell me please how I can launch pupy now with docker-compose ?

PS : pupy rocks, really thank you for the author and contributors.

TheFatRat

Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .

  • Updated Jun 3, 2020
  • C
ghost

Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.

  • Updated Jun 9, 2020
  • Python

This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell

  • Updated Mar 9, 2020
  • Shell

Improve this page

Add a description, image, and links to the backdoor topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the backdoor topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.