mehulj94 / BrainDamageLinks
Remote administration service which uses twitter as a command and control server
☆717Updated 4 years ago
Alternatives and similar repositories for BrainDamage
Users that are interested in BrainDamage are comparing it to the libraries listed below
Sorting:
- powerful auto-backdooring utility☆751Updated 7 years ago
- Python logger with multiple features.☆527Updated 4 years ago
- A framework for Backdoor development!☆435Updated 7 years ago
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malic…☆511Updated 8 years ago
- A simple, fully python ransomware PoC☆376Updated 5 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆507Updated 6 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆324Updated 6 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,429Updated 7 years ago
- NXcrypt - 'python backdoor' framework☆368Updated 8 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆603Updated 4 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆438Updated 8 years ago
- transform your payload.exe into one fake word doc (.ppt)☆468Updated 5 years ago
- EternalRocks worm☆465Updated 8 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,688Updated 6 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Updated 2 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆785Updated 5 years ago
- raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees usin…☆792Updated 5 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆411Updated 2 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆625Updated 7 years ago
- A framework for wireless pentesting.☆1,223Updated 5 years ago
- wide range mass audit toolkit☆1,031Updated 7 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆547Updated last year
- A PoC backdoor that uses Gmail as a C&C server☆1,343Updated 7 years ago
- NSA finest tool☆987Updated 8 years ago
- This is an open source tool to dump the wifi profiles and cleartext passwords of the connected access points on the Windows machine. This…☆290Updated 8 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆590Updated 3 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆224Updated 4 years ago
- Malware exploits☆553Updated 3 months ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,320Updated 4 years ago
- A fast and stealthy credential harvester☆630Updated 2 years ago