byt3n33dl3 / NeelBotExecLinks
π BotNet ( .NET ) Source Codes
β14Updated last year
Alternatives and similar repositories for NeelBotExec
Users that are interested in NeelBotExec are comparing it to the libraries listed below
Sorting:
- Backdoor for Rubella on Shell'sβ32Updated last year
- rootkit and kernel pentesting for Linux, most advanced malware for SUID.β10Updated last year
- Docker Payloads (Bypass) Data at the endpoint when running NestJS APK.β17Updated last year
- Encrypting directory and access. Execute the commands based on external inputs RCE, single-C2 and key-logging.β11Updated last year
- Kerberos Attacks From Networks or Domain controller log Perspective through HMAC in exchanges.β30Updated last year
- Password hash decryption utilities, fastest and most advanced password cracking. Supports hundreds of hash & cipher types, runs on many oβ¦β48Updated last year
- Internal data collector for BloodHound and BlackMarlinExec pathway strategies through LDAP.β107Updated 7 months ago
- Weaponizing Nim, with the elegance of modern logic programming language. Nim can do that!?β12Updated last year
- Active Directory kerberos attack framworks.β43Updated last year
- An Open source Pentesting Software for Mapping Injection points to Takeover.β53Updated last year
- Kerberos Attacks by cracking the system or router that provides a gateway for Active Directory.β20Updated last year
- Yarn BHCE by using Neo4j to store Networks objects and relationships as graph nodes and edges, enabling attack path discovery.β55Updated 9 months ago
- A swiss army Knife for Penetration testing Networks and Active Directory.β44Updated 10 months ago
- worlds most advanced GUI applications for C2 and remote-access, based on trojan's malware.β13Updated 6 months ago
- CLI application for credentials recovery, converting and multi-threaded cracking mechanism for online and offline scenario.β84Updated last year
- Prevent users from accessing online services. Distributed Denied of Service Attack server that cuts off targets or surrounding Infrastrucβ¦β10Updated last year
- Seven Degrees of Domain Adminβ84Updated last year
- MFA and 2FA chainers, authentication PenTesting frameworks.β19Updated last year
- Release Neo the Evil-Ducky, a scripts for rubber-ducky USB.β12Updated last year
- Github Profile Readme (https://byt3n33dl3.substack.com/)β36Updated 2 weeks ago
- Nikto the Alienware, scanning for misconfigurations and Information disclosures on WebApp.β17Updated last year
- Offshore for LLMNR/NBT-NS Poisoning and abuse for PrivEsc.β27Updated last year
- Playing with WPA frequency sessions framworks, check-lists of customs firmware and intensity of RF.β13Updated last year
- Latest WannaCry ransomware version (2.0) for adversary emulation assessment, encripting Program Files (x86), Program Files (x64), Programβ¦β64Updated last year
- Automated exploit scanners for public CCTV's services and other polaroid public stuff.β23Updated last year
- Support CobaltStrike kit for File System (NTFS/NPFS) Minifilter Drivers error handling.β17Updated last year
- Crawler malware through SMB share or LDAP queries, (require Administrator access for DCSync atttack).β12Updated last year
- WiFi Pentesting on Mac filters bypass and SSID manipulation.β21Updated last year
- BloodHound Attack Research Kit. BARK is an Attack Kit for Attack path Management.β13Updated last year
- Enterprise level of Parallelization SSH (Concurrency), Logon Penetration Testing.β26Updated last year