JusticeRage / freedomfighting
A collection of scripts which may come in handy during your freedom fighting activities.
☆405Updated last year
Alternatives and similar repositories for freedomfighting:
Users that are interested in freedomfighting are comparing it to the libraries listed below
- A framework for Backdoor development!☆436Updated 6 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆520Updated 7 years ago
- ☆510Updated last year
- IP obfuscator made to make a malicious ip a bit cuter☆542Updated 3 months ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆607Updated 6 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆826Updated 7 years ago
- Modern tactical exploitation toolkit.☆841Updated 6 months ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆253Updated 7 years ago
- Malware exploits☆539Updated 5 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆352Updated 6 years ago
- Linux Memory Cryptographic Keys Extractor☆234Updated last year
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Updated 4 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆635Updated last year
- Collection of social engineering payloads☆294Updated 7 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆409Updated 4 years ago
- ☆601Updated 3 months ago
- A powerful and extensible wireless drop box☆265Updated 6 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948Updated 5 years ago
- SSLStrip version to defeat HSTS☆315Updated 7 years ago
- ☆423Updated 7 years ago
- Script to steal passwords from ssh.☆478Updated 6 years ago
- A database of common, interesting or useful commands, in one handy referable form☆747Updated last year
- Automated Linux evil maid attack☆423Updated 9 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆159Updated 5 years ago
- Various PoCs☆490Updated 5 years ago
- powerful auto-backdooring utility☆741Updated 7 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆538Updated 2 years ago
- A web front-end for password cracking and analytics☆623Updated 3 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆435Updated 7 years ago