byt3n33dl3 / NeelBotExecLinks
๐ BotNet ( .NET ) Source Codes
โ14Updated last year
Alternatives and similar repositories for NeelBotExec
Users that are interested in NeelBotExec are comparing it to the libraries listed below
Sorting:
- Backdoor for Rubella on Shell'sโ32Updated last year
- Encrypting directory and access. Execute the Commands Based on external inputs RCE.โ11Updated last year
- Kerberos Attacks From Networks or Domain controller log Perspective through HMAC in exchanges.โ30Updated last year
- Docker Payloads (Bypass) Data at the endpoint when running NestJS APK.โ17Updated last year
- rootkit and kernel pentesting for Linux, most advanced malware for SUID.โ10Updated last year
- Sharp and GPO abuse for PrivEsc, Data Collector for BloodHound and BlackMarlinExec.โ105Updated 4 months ago
- Password hash decryption utilities, fastest and most advanced password cracking. Supports hundreds of hash & cipher types, runs on many oโฆโ48Updated last year
- An Open source Pentesting Software for Mapping Injection points to Takeover.โ53Updated 10 months ago
- Weaponizing Nim, with the elegance of modern logic programming language. Nim can do that!?โ12Updated last year
- yarn BHCE, Six Degrees of Domain Admin. Using Neo4j to store Networks objects and relationships as graph nodes and edges, enabling path-fโฆโ55Updated 6 months ago
- Kerberos Attacks by cracking the system or router that provides a gateway for Active Directory.โ20Updated last year
- Offshore the Maze Octopus for Remote Admin Access.โ27Updated last year
- Ticket harvesting frameworks for kerberos pentesting.โ43Updated 11 months ago
- ๐ฐ๐ช WannaCry ๐ฅ๐ฎ๐ป๐๐ผ๐บ๐๐ฎ๐ฟ๐ฒ. This malware spread by using a vulnerability Exploit Called "EternalBlue".โ58Updated last year
- A swiss army Knife for Penetration testing Networks and Active Directory.โ45Updated 8 months ago
- Nikto the Alienware, scanning for misconfigurations and Information disclosures on WebApp.โ17Updated last year
- MFA and 2FA chainers, authentication PenTesting frameworks.โ19Updated last year
- Seven Degrees of Domain Adminโ84Updated 10 months ago
- Github Profile Readmeโ36Updated 4 months ago
- Release Neo the Evil Ducky, A scripts into any Hardware or drive Devices.โ12Updated last year
- P O I S O N I N Gโ20Updated last year
- Prevent users from accessing online services. Distributed Denied of Service Attack server that cuts off targets or surrounding Infrastrucโฆโ10Updated last year
- Combining "Authentication" to convey on Active Directory. Advanced Kerberos attacks.โ15Updated last year
- Trojan GUI and Victims Display panel Orbitโ11Updated 3 months ago
- BloodHound Attack Research Kit. BARK is an Attack Kit for Attack path Management.โ13Updated last year
- Attacking Assimilation-bridge by looping [SNMPv3 & GPG], usingas CPUs, FPGAs cycles [MOV EAX, 0x989], most advanced password and logon reโฆโ85Updated 9 months ago
- Automated Exploit scanners for public Camera, CCTV's, and Capture Devices.โ22Updated 11 months ago
- Android pentesting frameworks, and a knife for frida payloads.โ38Updated last year
- Configurations and Deprecated payloads. Some useful scripts for Cobaltstrike.โ17Updated last year
- Six Degrees of Enterprise Domain Adminโ27Updated 3 months ago