BDFProxy (The Backdoor Factory Proxy) version-0.3.7 released.
For security professionals and researchers only. Changelog v0.3.7 : – removing dependencies on python_magic and libmagic BDFProxy v0.3.7 This script rides on two libraries for usage: The Backdoor...
View ArticleThe Backdoor Factory (BDF) v-3.2.3 released : Patch PE, ELF, Mach-O binaries...
NOTICE: For security professionals and researchers only. Changelog 11/13/2015 v2.3.2: – proper removeal of PE Sig resulting in better IAT patching – pebin.py : proper truncation of unsigned PE –...
View ArticleBackdoorMe – a powerful auto-backdooring utility.
Backdoorme is a simple utility that logs into a Linux machine and gives the user the option to install a slew of backdoors. BackdoorMe a powerful auto-backdooring utility. This Backdoor has Been Tested...
View Articlenetool.sh version 4.6 codename ‘Single_byte_XOR’ released : MitM PENTESTING...
Changelog v-4.6: The toolkit was named of ‘Single_byte_XOR’ because this version it focous in obfuscating payloads with the inclusion of Shellter PE injector and diferent msf encoders with diferent...
View ArticleEmpire v1.3.6 released : PowerShell post-exploitation agent.
Changelog v-1.3.6: – Combined persistence/debugger/* into persistence/misc/debugger – Added SysWow64 option to management/spawn to spawn a 32-bit powershell.exe – Added...
View ArticleEmpire v1.3.7 released : PowerShell post-exploitation agent.
Changelog v-1.3.7: – Updated powerview.ps1 – Added situational_awareness/network/powerview/get_cached_rdpconnection – Added situational_awareness/network/powerview/set_ad_object – Added...
View ArticleNishang v-0.6.1 – PowerShell for penetration testing and offensive security.
Changelog v0.6.1: + Added Show-TargetScreen to the Gather directory. DESCRIPTION This script uses MJPEG to stream a target’s desktop in real time. It is able to connect to a standard netcat listening...
View ArticleThe Backdoor Factory (BDF) v-3.3.0 – Patch PE, ELF, Mach-O binaries with...
Changelog v3.3.0: + Added PE codesiging support. You must provide your own codesigning cert. You can see full disclosure how to Add PE Code Signing to Backdoor Factory (BDF). BDFactory-v-3-3-0Test Run...
View ArticleBDFProxy (The Backdoor Factory Proxy) version-0.3.8 released.
For security professionals and researchers only. Changelog v0.3.8 12/20/2015: + Added configuration options in bdfproxy.cfg to support PE code signing from BDF => CODE_SIGN See BDF README for...
View ArticleJuniper Backdoor – search possible backdoor host and bulk verified.
Background: Censys is a networking device to search for information about new search engine, security experts can use it to evaluate their programs to achieve security, hackers can use it as a...
View ArticleUpdates BackdoorMe – a powerful auto-backdooring utility.
Latest Change 23/12/2015: + fixed travis version. + added poison module. + Fixed Bash and added a second bash backdoor. + removed offending tests. Backdoorme is a simple utility that logs into a Linux...
View Articlesidedoor is a Backdoor using a reverse SSH tunnel.
sidedoor is a Backdoor using a reverse SSH tunnel on Debian/Ubuntu systems. sidedoor maintains a reverse SSH tunnel to provide a backdoor. sidedoor can be used to remotely control a device behind a...
View ArticleNishang v-0.6.2 – PowerShell for penetration testing and offensive security.
Changelog v0.6.2: + Added support for dumping cleartext credentials from RDP sessions for Invoke-MimikatzWfigestDowngrade. – fix issues #29.DESCRIPTION This script uses MJPEG to stream a target’s...
View Articlebackdoor-image is a ‘backdoor’ user to a image or filesystem at ‘target’.
NOTICE : This post and script for research Purpose Only! backdoor-image is a ‘backdoor’ user to a image or filesystem at ‘target’. File lists: + backdoor-image.sh add a ‘backdoor’ user to a image or...
View ArticleLynxFramework is an extension browser exploitation framework.
LynxFramework is an operating tool for web browser offering a specialized service in the effect browser extension development , namely Google Chrome and Firefox soon. The operation is based on the...
View ArticleBypassUAC is a Defeating Windows User Account Control by abusing built-in...
BypassUAC is a Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor. System Requirements 1.x86-32/x64 Windows 7/8/8.1/10 (client, some methods however works on server...
View Articleshellsploit-framework v1-beta : New Generation Exploit Development Kit.
Shellsploit let’s you generate customized shellcodes, backdoors, injectors for various operating system. And let’s you obfuscation every byte via encoders. Requirement: + capstone + readline...
View ArticleNishang v-0.6.3 – PowerShell for penetration testing and offensive security.
Changelog v0.6.3: + Added Invoke-Interceptor to the MITM directory. Parameter Invoke-Interceptor DESCRIPTION This script uses MJPEG to stream a target’s desktop in real time. It is able to connect to a...
View ArticleKautilya v0.5.6.1- Tool for easy use of Human Interface Devices for offensive...
Roadmap Changelog Latest Change 11/2/2016 v0.5.6.1: + Added Invoke-PosRatHttps in the extras directory. v0.5.6: – Added “Reverse TCP Shell” under the Execute category. – Added “Reverse UDP Shell” under...
View ArticleUpdates rooty – libpcap based ICMP encrypted backdoor for linux.
Latest Changes 26/2/2016: – Removing FreeBSD and CCDC files for now. – msf & src; Moving everything to ICMP echo request ID. Rooty based idea from SilentDoor ; PCAP-based backdoor for linux that...
View Article