Skip to content

Latest commit

 

History

History
24 lines (21 loc) · 1.43 KB

README.md

File metadata and controls

24 lines (21 loc) · 1.43 KB

Backdoors

Tools designed for maintaining access to systems and proof-of-concept demonstrations written by the team at Hacker House. These tools are designed to simulate or demonstrate common persistence techniques such as kernel mode hooking and command & control implementations.

File Description
bindshell.go bind shell example written in GoLang
bindshell.py bind shell example writen in Python
cmdbot.py Python bot to exec commands via IRC C2
filehider.tgz Linux kernel module for hiding files
halloween.py Python script appender VX injection PoC
icmp.py ICMP raw socket command execution
luna.tgz AX.25 APRS C2 implementation PoC (works via satellite)
magicroot.tgz Linux kernel module for "magic" root backdoor
MalwareTool.tgz PE executable dropper via embedded resource
Peony.zip Windows Defender Avbypass meterpreter harness
rubilyn-0.0.1.tar.gz OS-X Lion 64bit rootkit example code
SYSTEMservice.tgz Windows service persistent bind shell (SYSTEM)
StringCrypt.tgz OS-X string encryptor for use with rubilyn
TrojanSource.zip Web based C2 implant to capture screen & keystrokes
yolo-openssl.tgz OpenSSL backdoor to add "yolo shellme" extension
Zombie.tgz Multi-threaded Linux backdoor with command execution

These files are available under a Attribution-NonCommercial-NoDerivatives 4.0 International license.