JusticeRage / freedomfighting
A collection of scripts which may come in handy during your freedom fighting activities.
☆406Updated 2 years ago
Alternatives and similar repositories for freedomfighting:
Users that are interested in freedomfighting are comparing it to the libraries listed below
- A framework for Backdoor development!☆437Updated 7 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆612Updated 6 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆538Updated 2 years ago
- ☆605Updated 7 months ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆523Updated 8 years ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆195Updated 8 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆321Updated 2 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆356Updated 2 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆228Updated 6 years ago
- A web front-end for password cracking and analytics☆624Updated 3 years ago
- Automated Linux evil maid attack☆426Updated 9 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆372Updated 2 years ago
- EternalRocks worm☆459Updated 7 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆314Updated 7 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 7 years ago
- ☆515Updated last year
- powerful auto-backdooring utility☆746Updated 7 years ago
- Scans for accessibility tools backdoors via RDP☆340Updated 7 years ago
- Linux Memory Cryptographic Keys Extractor☆238Updated last year
- HORSEPILL rootkit PoC☆228Updated 8 years ago
- A stealthy Python based Windows backdoor that uses Github as a command and control server☆263Updated 7 years ago
- Modern tactical exploitation toolkit.☆847Updated 9 months ago
- ☆426Updated 7 years ago
- Malware exploits☆545Updated 5 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆950Updated 6 years ago
- Remote administration service which uses twitter as a command and control server☆713Updated 4 years ago
- A database of common, interesting or useful commands, in one handy referable form☆747Updated last year
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆727Updated 7 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆639Updated last year