S12cybersecurity / RedNeuron
RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux πΎ
β67Updated last year
Alternatives and similar repositories for RedNeuron:
Users that are interested in RedNeuron are comparing it to the libraries listed below
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pagβ¦β124Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actualβ¦β59Updated 3 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eacβ¦β42Updated last month
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.β105Updated 2 months ago
- A C2 framework built for my bachelors thesisβ56Updated 3 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachmβ¦β123Updated 2 years ago
- Collection of extra pentest tools for Kali Linuxβ102Updated last year
- Red Teaming tools and techniquesβ50Updated 2 years ago
- Mass bruteforce authentication of common services with common credentials.β45Updated last year
- Social Engineering Browser Update Attack.β56Updated last year
- Joomla! < 4.2.8 - Unauthenticated information disclosureβ82Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.β47Updated 2 years ago
- Undetectable payload for Windows 10 and 11β40Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving conβ¦β125Updated 7 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionalityβ50Updated 2 years ago
- This is for Ethical Use only!β29Updated 2 weeks ago
- Hide an IP address in scripts using hex/decimal/octal conversionsβ65Updated last year
- OpenSSH 9.1 vulnerability mass scan and exploitβ8Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written β¦β131Updated 7 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP β¦β34Updated last year
- Red Teaming and Penetration Testing Checklist, Cheatsheet, Clickscriptβ85Updated last year
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) oβ¦β85Updated 7 months ago
- Gmail/GSuite account enumeration toolβ51Updated 11 months ago
- β16Updated 9 months ago
- Check out this JavaScript code that extracts URLs from a web page and linked scripts! Perfect for web scraping and penetration testingβ18Updated 7 months ago
- PowerShell Obfuscatorβ112Updated 8 months ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a brβ¦β30Updated last year
- Create a fully undetectable backdoor with simple steps.β73Updated 2 years ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]β31Updated 8 months ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defenderβ21Updated 2 years ago