RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux πΎ
β73Apr 7, 2023Updated 3 years ago
Alternatives and similar repositories for RedNeuron
Users that are interested in RedNeuron are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keysβ31Nov 29, 2022Updated 3 years ago
- AdminX it's a Malware to execute process as some users from a Windows OSβ10May 4, 2023Updated 2 years ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OSβ60Nov 25, 2025Updated 5 months ago
- Interactive shell to execute commands anonymously using Proxychains and Torβ74Feb 1, 2023Updated 3 years ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injectionβ18Mar 18, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer β’ AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A Windows token-theft utility that enumerates SYSTEM processes, duplicates their access token, and spawns a new process running as NT AUTβ¦β65Mar 26, 2026Updated last month
- C++ keylogger to save all the keys pressed into a local txt fileβ10Apr 6, 2023Updated 3 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Adminβ23Aug 21, 2023Updated 2 years ago
- Simple Python Modular Script to Broke Web Loginsβ15Oct 7, 2022Updated 3 years ago
- Shellcode execution via x86 inline assembly based on MSVC syntaxβ17Apr 26, 2023Updated 3 years ago
- SQLiToolkit is a SQL injection Based Toolkit. There are many features such as Vulnerability Scanner, Url Fuzzer in this tool. This is a Uβ¦β13Feb 8, 2022Updated 4 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for penβ¦β13May 11, 2023Updated 2 years ago
- β16Dec 4, 2023Updated 2 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.β13Mar 16, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Source Code Management Attack Toolkitβ13Aug 1, 2022Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.β53Nov 8, 2022Updated 3 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.β10Aug 4, 2023Updated 2 years ago
- Simple C++ Reverse Shellβ12Nov 22, 2022Updated 3 years ago
- Simple Ransoware to attack Windows πββ25Apr 19, 2023Updated 3 years ago
- A fast, lightweight botnet written in pure C.β41Nov 10, 2021Updated 4 years ago
- C++ Code to perform a MiniDump of lsass.exeβ36Aug 2, 2023Updated 2 years ago
- A program to steal user information through a simple linkβ13May 19, 2023Updated 2 years ago
- β12Aug 31, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- β10Mar 29, 2022Updated 4 years ago
- some AV / EDR / analysis studiesβ10May 21, 2023Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) oβ¦β90Jul 19, 2024Updated last year
- Collection Of Terrible CNC/Qbot Panelsβ11Aug 8, 2025Updated 8 months ago
- Tutorials and Things to Do while Hunting Vulnerability.β10May 15, 2025Updated 11 months ago
- A .net lib to generate an native coff executableβ13Apr 30, 2015Updated 11 years ago
- Offensive Linux tool for network attacks. Built from the ground with only C.β14May 1, 2021Updated 4 years ago
- CVE-2023-20052, information leak vulnerability in the DMG file parser of ClamAVβ27May 8, 2023Updated 2 years ago
- A collection of malwares found on the internet.β66May 16, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Swiss army knife of hacking written in Golang, capable of performing various kinds of attacks πβ189Sep 10, 2025Updated 7 months ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR β¦β259Jul 7, 2022Updated 3 years ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCEβ19Mar 24, 2024Updated 2 years ago
- Duplicate not owned Token from Running Processβ73Jul 21, 2023Updated 2 years ago
- Amsi Bypass payload that works on Windwos 11β381Jul 30, 2023Updated 2 years ago
- Windows Defender Killer | Registry-Based Disablement + BYOVD Process Termination (C++)β529Apr 2, 2026Updated 3 weeks ago
- Offensive Security & Red Teaming Labs and Projectsβ27Aug 26, 2025Updated 8 months ago