mehulj94 / BrainDamageLinks
Remote administration service which uses twitter as a command and control server
☆713Updated 4 years ago
Alternatives and similar repositories for BrainDamage
Users that are interested in BrainDamage are comparing it to the libraries listed below
Sorting:
- powerful auto-backdooring utility☆747Updated 7 years ago
- Python logger with multiple features.☆528Updated 3 years ago
- A framework for Backdoor development!☆436Updated 7 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆602Updated 3 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 8 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆408Updated 2 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆324Updated 5 years ago
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malic…☆514Updated 8 years ago
- A simple, fully python ransomware PoC☆376Updated 5 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆504Updated 6 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,421Updated 6 years ago
- NXcrypt - 'python backdoor' framework☆367Updated 8 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Updated 2 years ago
- transform your payload.exe into one fake word doc (.ppt)☆468Updated 5 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆615Updated 6 years ago
- raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees usin…☆791Updated 5 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆546Updated 8 months ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 4 years ago
- EternalRocks worm☆460Updated 8 years ago
- wide range mass audit toolkit☆1,028Updated 6 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,336Updated 6 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,677Updated 5 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆776Updated 4 years ago
- The hackers tool belt☆519Updated 6 years ago
- PenBox - A Penetration Testing Framework - The Tool With All The Tools , The Hacker's Repo☆475Updated 8 years ago
- A framework for wireless pentesting.☆1,212Updated 4 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆950Updated 6 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,000Updated 7 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆331Updated 11 months ago
- This is an open source tool to dump the wifi profiles and cleartext passwords of the connected access points on the Windows machine. This…☆289Updated 7 years ago