Security List Network™
Follow Us on FacebookFollow Us on Google+Follow Us on TwitterFollow Us on Pinterest
Menu
  • Home
  • About Us
  • Security Archives
  • Partners
Menu
  • Automation
  • Browser
  • Brute Force
  • Code Scripting
  • Cryptography
  • Encryption
  • Exploits
  • Framework
  • Linux Security Distros
  • Mobile Applications Tools
    • Android Tools
    • iPhone Tools
  • Networking
    • Bluetooth
    • Monitoring/System Administrator
    • Network Mapping/Scanner
    • Packet Sniffer/Sniffing
    • Internet Security
    • Spoofing/Spoofer
    • Wireless/wifi
  • Penetration Test
    • BenchMark
    • Cross Site Scripting(XSS)
    • Fuzzer/Fuzzing
    • Sql Injection
    • Stress Testing
  • Security Tools
    • Anti Malware/Virus – Malware Analysis
    • Firewall
    • Intrussion Detection and Prevention System(IDS/IPS)
    • Registry Analysis

SITEMAP

Archives

Browse: Home   /   Backdoor   /   Page 17
Updates The Backdoor Factory Proxy (BDFProxy) version-0.3.2.

Updates The Backdoor Factory Proxy (BDFProxy) version-0.3.2.

April 13, 2015
0x0mar
Encryption, Exploits, Penetration Test

For security professionals and researchers only. Change : Add support for BDF 3.0 This script rides on two libraries for usage: The Backdoor Factory (BDF)…

Read Article →
Root Pipe : Privileges Escallation and Backdoor Api Root in OSX.

Root Pipe : Privileges Escallation and Backdoor Api Root in OSX.

April 11, 2015
0x0ptimus
Exploits

Root Pipe – This is a Proof-of-Concept Mac Application that demonstrates the RootPipe Privilege Escalation Vulnerability (CVE-2015-1130). this tool to create Hidden backdoor API to root…

Read Article →
Jerricho - a script for deploying simple Linux rootkit and backdoors.

Jerricho – a script for deploying simple Linux rootkit and backdoors.

April 8, 2015
HoChi-Minh
Exploits, Penetration Test

Jerricho is a simple bourne script that quickly drops several persistence mechanisms on a target Linux host. OS Support : Ubuntu, Centos, Debian, FreeBSD. TODO:…

Read Article →
NTP_Trojan - Reverse NTP remote access trojan in python, for penetration testers.

NTP_Trojan – Reverse NTP remote access trojan in python, for penetration testers.

April 7, 2015
Infosec
Penetration Test

NTP_Trojan is a Reverse NTP remote access trojan in python, for penetration testers. This idea to create a trojan that uses NTP as it’s command…

Read Article →
Pr0t0s released : Phishing Panel API.

Pr0t0s released : Phishing Panel API.

April 6, 2015
anon80
Penetration Test, Phishing

The Phishig panel on the basis of the Tools panel backdoors programmed. The panel is designed for ease of use and range. 100% The error…

Read Article →
Rooty v-10.1 released : libpcap based ICMP encrypted backdoor for linux.

Rooty v-10.1 released : libpcap based ICMP encrypted backdoor for linux.

March 24, 2015
0x0ptimus
Encryption, Exploits, Packet Sniffer/Sniffing

Change version 10.1: – Allow overriding default interface on FreeBSD and update metasploit module for commands – Adding FreeBSD binaries – Initial windows port Rooty…

Read Article →
Kadimus is a LFI Scan and Exploit Toolkit.

Kadimus is a LFI Scan and Exploit Toolkit.

March 17, 2015
Fragile
Exploits, Penetration Test, Sql Injection

Kadimus is a LFI Scan and Exploit Toolkit. With many options and Techniques : – Request : get connection, get header, get cookies – Vulnerability…

Read Article →
Reverse_HTTPS_Bot v-0.8 released : A python based https remote access trojan for penetration testing.

Reverse_HTTPS_Bot v-0.8 released : A python based https remote access trojan for penetration testing.

March 15, 2015
w0rm32
Exploits, Penetration Test

Reverse_HTTPS_Bot is A python based https remote access trojan for penetration testing. Server is currently NodeJS based Bot Requires: pip install requests Server Requires: –…

Read Article →
← Previous 1 … 16 17 18 … 23 Next →

Copyright © 2018

Powered by Worldwide CyberSecurity Team.

  • Digital Forensics
  • Networking
  • Penetration Test
  • Security Tools