JusticeRage / freedomfighting
A collection of scripts which may come in handy during your freedom fighting activities.
☆404Updated last year
Alternatives and similar repositories for freedomfighting:
Users that are interested in freedomfighting are comparing it to the libraries listed below
- A framework for Backdoor development!☆436Updated 7 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆521Updated 7 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆356Updated 2 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆612Updated 6 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆986Updated 7 years ago
- ☆603Updated 5 months ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆194Updated 8 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆824Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆437Updated 7 years ago
- A webshell framework for penetration testers.☆297Updated 11 months ago
- Various PoCs☆490Updated 5 years ago
- EternalRocks worm☆454Updated 7 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆224Updated 6 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆409Updated 4 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆370Updated last year
- Linux Memory Cryptographic Keys Extractor☆237Updated last year
- Automated Linux evil maid attack☆426Updated 9 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆465Updated 8 months ago
- Malware exploits☆543Updated 5 years ago
- ☆280Updated 4 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,209Updated 4 years ago
- Public repository for improvements to the EXTRABACON exploit☆159Updated 8 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 6 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆725Updated 7 years ago
- A database of common, interesting or useful commands, in one handy referable form☆747Updated last year
- Modern tactical exploitation toolkit.☆842Updated 8 months ago
- ☆425Updated 7 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆637Updated last year
- Remote Recon and Collection☆448Updated 7 years ago
- HORSEPILL rootkit PoC☆225Updated 8 years ago