mehulj94 / BrainDamageLinks
Remote administration service which uses twitter as a command and control server
☆721Updated 4 years ago
Alternatives and similar repositories for BrainDamage
Users that are interested in BrainDamage are comparing it to the libraries listed below
Sorting:
- powerful auto-backdooring utility☆748Updated 8 years ago
- Python logger with multiple features.☆527Updated 4 years ago
- A framework for Backdoor development!☆434Updated 7 years ago
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malic…☆511Updated 9 years ago
- A simple, fully python ransomware PoC☆376Updated 5 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆322Updated 6 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆506Updated 6 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,436Updated 7 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆600Updated 4 years ago
- NXcrypt - 'python backdoor' framework☆368Updated 8 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆442Updated 8 years ago
- transform your payload.exe into one fake word doc (.ppt)☆470Updated 6 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆412Updated 2 years ago
- NSA finest tool☆984Updated 8 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆628Updated 7 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆548Updated last year
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Updated 2 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,690Updated 6 years ago
- raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees usin…☆794Updated 5 years ago
- EternalRocks worm☆467Updated 8 years ago
- A framework for wireless pentesting.☆1,228Updated 5 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,344Updated 7 years ago
- PenBox - A Penetration Testing Framework - The Tool With All The Tools , The Hacker's Repo☆530Updated 9 years ago
- This is an open source tool to dump the wifi profiles and cleartext passwords of the connected access points on the Windows machine. This…☆293Updated 8 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆949Updated 6 years ago
- Malware exploits☆555Updated 5 months ago
- Pythonic ransomware proof of concept.☆220Updated 5 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆787Updated 5 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225Updated 4 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆339Updated last year