RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux πΎ
β72Apr 7, 2023Updated 3 years ago
Alternatives and similar repositories for RedNeuron
Users that are interested in RedNeuron are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keysβ31Nov 29, 2022Updated 3 years ago
- AdminX it's a Malware to execute process as some users from a Windows OSβ10May 4, 2023Updated 3 years ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OSβ59Nov 25, 2025Updated 5 months ago
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened witβ¦β14Apr 2, 2023Updated 3 years ago
- Interactive shell to execute commands anonymously using Proxychains and Torβ81Feb 1, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injectionβ18Mar 18, 2023Updated 3 years ago
- A Windows token-theft utility that enumerates SYSTEM processes, duplicates their access token, and spawns a new process running as NT AUTβ¦β65Mar 26, 2026Updated last month
- C++ keylogger to save all the keys pressed into a local txt fileβ10Apr 6, 2023Updated 3 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Adminβ23Aug 21, 2023Updated 2 years ago
- Simple Python Modular Script to Broke Web Loginsβ15Oct 7, 2022Updated 3 years ago
- Shellcode execution via x86 inline assembly based on MSVC syntaxβ17Apr 26, 2023Updated 3 years ago
- SQLiToolkit is a SQL injection Based Toolkit. There are many features such as Vulnerability Scanner, Url Fuzzer in this tool. This is a Uβ¦β13Feb 8, 2022Updated 4 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for penβ¦β13May 11, 2023Updated 3 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.β13Mar 16, 2022Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer β’ AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Source Code Management Attack Toolkitβ13Aug 1, 2022Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.β51Nov 8, 2022Updated 3 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.β10Aug 4, 2023Updated 2 years ago
- Simple C++ Reverse Shellβ12Nov 22, 2022Updated 3 years ago
- Simple Ransoware to attack Windows πββ25Apr 19, 2023Updated 3 years ago
- A fast, lightweight botnet written in pure C.β41Nov 10, 2021Updated 4 years ago
- Arbitrium is a cross-platform, fully undetectable remote access trojan, to control Android, Windows and Linux and doesn't require any firβ¦β21Mar 19, 2021Updated 5 years ago
- β12Aug 31, 2018Updated 7 years ago
- β10Mar 29, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- some AV / EDR / analysis studiesβ10May 21, 2023Updated 3 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) oβ¦β90Jul 19, 2024Updated last year
- Tutorials and Things to Do while Hunting Vulnerability.β10May 15, 2025Updated last year
- A .net lib to generate an native coff executableβ12Apr 30, 2015Updated 11 years ago
- Offensive Linux tool for network attacks. Built from the ground with only C.β13May 1, 2021Updated 5 years ago
- Perform Thread Hijacking Shellcode Injection without OpenProcess and OpenThread mapping all the free handles in memoryβ16Jul 16, 2024Updated last year
- C# loader capable of running stage-1 from remote url, file path as well as file shareβ14Feb 8, 2023Updated 3 years ago
- advance web crawler to crawl urls from website using python.β10Apr 24, 2023Updated 3 years ago
- Swiss army knife of hacking written in Golang, capable of performing various kinds of attacks πβ189Sep 10, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 2 PE Loader tools that load a PE from memory, decrypt it and make some magic things to execute seamlessly from memoryβ54Apr 16, 2026Updated last month
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR β¦β259Jul 7, 2022Updated 3 years ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCEβ19Mar 24, 2024Updated 2 years ago
- Use your android phone as trackpad on Windows or Linux systemsβ11Aug 27, 2020Updated 5 years ago
- Duplicate not owned Token from Running Processβ73Jul 21, 2023Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL packageβ35Mar 28, 2023Updated 3 years ago
- Amsi Bypass payload that works on Windwos 11β381Jul 30, 2023Updated 2 years ago