redcode-labs / neurax
A framework for constructing self-spreading binaries
☆1,008Updated last year
Alternatives and similar repositories for neurax:
Users that are interested in neurax are comparing it to the libraries listed below
- Golang malware development library☆950Updated 3 months ago
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆1,779Updated last year
- ☆368Updated 3 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,919Updated 2 years ago
- C2/post-exploitation framework☆1,062Updated 3 years ago
- Tool for especially scanning nearby devices and execute a given command on its own system while the target device comes in range.☆362Updated 3 years ago
- ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication☆995Updated 2 years ago
- A tool for generating fake code signing certificates or signing real ones☆904Updated last year
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,752Updated 2 years ago
- a recon tool that allows searching on URLs that are exposed via shortener services☆1,570Updated 2 months ago
- Copy and paste between devices☆816Updated 3 years ago
- ☆2,497Updated 2 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,085Updated 3 years ago
- Secure Shell Bruteforcer — A faster & simpler way to bruteforce SSH server☆1,284Updated 3 years ago
- Fake Windows logon screen to steal passwords☆1,322Updated 5 years ago
- CrackQ: A Python Hashcat cracking queue system☆932Updated 6 months ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,188Updated last month
- ☆1,262Updated last month
- EXOCET - AV-evading, undetectable, payload delivery tool☆838Updated 2 years ago
- ☆1,464Updated last year
- ParadoxiaRat : Native Windows Remote access Tool.☆791Updated last year
- 🔪 Leak git repositories from misconfigured websites☆1,563Updated 2 years ago
- Create fake certs for binaries using windows binaries and the power of bat files☆558Updated last year
- Statically-linked ssh server with reverse shell functionality for CTFs and such☆955Updated 2 years ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,331Updated 3 weeks ago
- A unique technique to execute binaries from a password protected zip☆1,023Updated 2 years ago
- Generate a custom Email Address in 1 Second and receive Emails.☆152Updated last year
- Crack any Microsoft Windows users password without any privilege (Guest account included)☆1,132Updated last year
- c++ fully undetected shellcode launcher ;)☆976Updated 3 years ago
- A tool for IDN homograph attacks and detection.☆734Updated 4 years ago