redcode-labs / neuraxLinks
A framework for constructing self-spreading binaries
☆1,017Updated last year
Alternatives and similar repositories for neurax
Users that are interested in neurax are comparing it to the libraries listed below
Sorting:
- Golang malware development library☆973Updated 8 months ago
- ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication☆1,008Updated 2 years ago
- ☆373Updated last week
- C2/post-exploitation framework☆1,090Updated 4 years ago
- CrackQ: A Python Hashcat cracking queue system☆938Updated 11 months ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,189Updated 3 months ago
- A collection of source code for various botnets.☆558Updated 5 years ago
- A tool for generating fake code signing certificates or signing real ones☆942Updated 2 years ago
- Secure Shell Bruteforcer — A faster & simpler way to bruteforce SSH server☆1,303Updated 3 years ago
- Second Version of The GoBot Botnet, But more advanced.☆748Updated 3 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,153Updated 3 years ago
- ☆1,467Updated last year
- A collection of source code for various RATs, Stealers, and other Trojans.☆447Updated 6 years ago
- ParadoxiaRat : Native Windows Remote access Tool.☆808Updated 2 years ago
- A tool for IDN homograph attacks and detection.☆738Updated 4 years ago
- Fake Windows logon screen to steal passwords☆1,362Updated 5 years ago
- Get unencrypted 'Saved Password' from Google Chrome☆736Updated last year
- EXOCET - AV-evading, undetectable, payload delivery tool☆846Updated 3 years ago
- 🔪 Leak git repositories from misconfigured websites☆1,584Updated 2 years ago
- Crack any Microsoft Windows users password without any privilege (Guest account included)☆1,151Updated last year
- A GNU/Linux monitoring and profiling tool focused on single processes.☆675Updated 3 years ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,787Updated 2 years ago
- Create fake certs for binaries using windows binaries and the power of bat files☆569Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,848Updated 2 years ago
- Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise☆684Updated 2 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,949Updated 2 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆2,990Updated last year
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,134Updated 4 months ago
- Adversary tradecraft detection, protection, and hunting☆2,375Updated 2 weeks ago
- [WIP] A free and open-source, modular Remote Administration Tool (RAT) / Payload Dropper written in Go(lang) with a flexible command and …☆228Updated last year