JusticeRage / freedomfightingLinks
A collection of scripts which may come in handy during your freedom fighting activities.
☆407Updated 2 years ago
Alternatives and similar repositories for freedomfighting
Users that are interested in freedomfighting are comparing it to the libraries listed below
Sorting:
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆613Updated 6 years ago
- A framework for Backdoor development!☆436Updated 7 years ago
- Scans for accessibility tools backdoors via RDP☆340Updated 7 years ago
- ☆606Updated 8 months ago
- (extensible) Data Exfiltration Toolkit (DET)☆828Updated 7 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Updated 5 years ago
- A stealthy Python based Windows backdoor that uses Github as a command and control server☆264Updated 7 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆525Updated 8 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆637Updated last year
- ☆518Updated last year
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆949Updated 6 years ago
- Linux Memory Cryptographic Keys Extractor☆238Updated 2 years ago
- Automated Linux evil maid attack☆426Updated 9 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆372Updated 2 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆999Updated 7 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆353Updated 6 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆464Updated 11 months ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆502Updated 5 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆539Updated 3 years ago
- Windows passwords decryption from dump files☆500Updated 2 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆547Updated 8 months ago
- GTRS - Google Translator Reverse Shell☆615Updated 8 months ago
- This Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method.☆678Updated 8 years ago
- ☆281Updated 5 years ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆197Updated 8 years ago
- ☆425Updated 7 years ago
- Remote Recon and Collection☆454Updated 7 years ago
- A Python Package for Data Exfiltration☆785Updated last year
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Updated 4 years ago