Skip to content
#

backdoor-attacks

Here are 156 public repositories matching this topic...

a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.

  • Updated Mar 27, 2022
  • Pascal
ANYDESK-BACKDOOR

You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increase the security of the open sourcecode.

  • Updated Mar 24, 2024
  • Python

Improve this page

Add a description, image, and links to the backdoor-attacks topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the backdoor-attacks topic, visit your repo's landing page and select "manage topics."

Learn more