S12cybersecurity / RedNeuronLinks
RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾
☆70Updated 2 years ago
Alternatives and similar repositories for RedNeuron
Users that are interested in RedNeuron are comparing it to the libraries listed below
Sorting:
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆123Updated 2 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆136Updated 3 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆63Updated 4 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆56Updated 7 months ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆87Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆69Updated 3 months ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated 10 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆132Updated last year
- Ready to go Phishing Platform☆51Updated 9 months ago
- Dark-Shell is a Tool for Generating ReverShell File☆114Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆110Updated 2 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆132Updated last year
- ☆132Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- Social Engineering Browser Update Attack.☆57Updated last year
- ☆92Updated 2 years ago
- Red Teaming tools and techniques☆54Updated 2 years ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆94Updated last year
- ☆15Updated last year
- Undetectable payload for Windows 10 and 11☆39Updated 2 years ago
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)☆32Updated 3 years ago
- Mass bruteforce authentication of common services with common credentials.☆48Updated last year
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆69Updated last year
- ☆160Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated 2 years ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated last year
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆109Updated 7 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Updated last month
- A C2 framework built for my bachelors thesis☆55Updated 9 months ago