mehulj94 / BrainDamageLinks
Remote administration service which uses twitter as a command and control server
☆715Updated 4 years ago
Alternatives and similar repositories for BrainDamage
Users that are interested in BrainDamage are comparing it to the libraries listed below
Sorting:
- powerful auto-backdooring utility☆751Updated 7 years ago
- Python logger with multiple features.☆525Updated 4 years ago
- A framework for Backdoor development!☆436Updated 7 years ago
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malic…☆512Updated 8 years ago
- A simple, fully python ransomware PoC☆376Updated 5 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,426Updated 6 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆324Updated 5 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆506Updated 6 years ago
- NXcrypt - 'python backdoor' framework☆367Updated 8 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆440Updated 8 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆600Updated 4 years ago
- transform your payload.exe into one fake word doc (.ppt)☆467Updated 5 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Updated 2 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,343Updated 6 years ago
- raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees usin…☆793Updated 5 years ago
- wide range mass audit toolkit☆1,031Updated 7 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,684Updated 5 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆409Updated 2 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆619Updated 7 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆783Updated 5 years ago
- PenBox - A Penetration Testing Framework - The Tool With All The Tools , The Hacker's Repo☆526Updated 8 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆545Updated last year
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 4 years ago
- The hackers tool belt☆519Updated 7 years ago
- This is an open source tool to dump the wifi profiles and cleartext passwords of the connected access points on the Windows machine. This…☆290Updated 8 years ago
- Undetectable Windows Payload Generation☆1,605Updated 2 years ago
- A fast and stealthy credential harvester☆628Updated 2 years ago
- Malware exploits☆548Updated 2 months ago
- EternalRocks worm☆462Updated 8 years ago
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,182Updated 3 years ago