mehulj94 / BrainDamage
Remote administration service which uses twitter as a command and control server
☆713Updated 4 years ago
Alternatives and similar repositories for BrainDamage:
Users that are interested in BrainDamage are comparing it to the libraries listed below
- powerful auto-backdooring utility☆746Updated 7 years ago
- A framework for Backdoor development!☆437Updated 7 years ago
- Python logger with multiple features.☆527Updated 3 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,410Updated 6 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 7 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆602Updated 3 years ago
- transform your payload.exe into one fake word doc (.ppt)☆467Updated 5 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆372Updated 2 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆500Updated 5 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆406Updated 2 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,333Updated 6 years ago
- A simple, fully python ransomware PoC☆374Updated 4 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆324Updated 5 years ago
- Undetectable Windows Payload Generation☆1,594Updated 2 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆545Updated 6 months ago
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malic…☆509Updated 8 years ago
- NXcrypt - 'python backdoor' framework☆365Updated 7 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆612Updated 6 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆771Updated 4 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆224Updated 4 years ago
- Malware exploits☆545Updated 5 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆950Updated 6 years ago
- EternalRocks worm☆459Updated 7 years ago
- PenBox - A Penetration Testing Framework - The Tool With All The Tools , The Hacker's Repo☆471Updated 8 years ago
- Python / C# Unmanaged PowerShell based RAT☆777Updated 2 years ago
- Script to steal passwords from ssh.☆480Updated 6 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,668Updated 5 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,309Updated 3 years ago
- Perform advanced MiTM attacks on websites with ease 💉☆674Updated last year
- Mirror of Shadowbrokers release from https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation☆436Updated 8 years ago