redcode-labs / neuraxLinks
A framework for constructing self-spreading binaries
☆1,022Updated 2 years ago
Alternatives and similar repositories for neurax
Users that are interested in neurax are comparing it to the libraries listed below
Sorting:
- Golang malware development library☆977Updated last year
- ☆373Updated 5 months ago
- ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication☆1,024Updated 2 years ago
- A tool for generating fake code signing certificates or signing real ones☆958Updated 2 years ago
- C2/post-exploitation framework☆1,132Updated 4 years ago
- ☆1,456Updated 2 years ago
- 🔪 Leak git repositories from misconfigured websites☆1,596Updated 2 months ago
- A collection of source code for various RATs, Stealers, and other Trojans.☆451Updated 6 years ago
- CrackQ: A Python Hashcat cracking queue system☆941Updated last year
- Fake Windows logon screen to steal passwords☆1,366Updated 6 years ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,783Updated 3 years ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,209Updated 8 months ago
- Tool for especially scanning nearby devices and execute a given command on its own system while the target device comes in range.☆380Updated 4 years ago
- Secure Shell Bruteforcer — A faster & simpler way to bruteforce SSH server☆1,314Updated 4 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,167Updated 4 years ago
- ParadoxiaRat : Native Windows Remote access Tool.☆815Updated 2 years ago
- A collection of source code for various botnets.☆566Updated 6 years ago
- EXOCET - AV-evading, undetectable, payload delivery tool☆844Updated 3 years ago
- Crack any Microsoft Windows users password without any privilege (Guest account included)☆1,156Updated 2 years ago
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆1,990Updated last year
- Create fake certs for binaries using windows binaries and the power of bat files☆571Updated last year
- A GNU/Linux monitoring and profiling tool focused on single processes.☆675Updated 4 years ago
- A tool for IDN homograph attacks and detection.☆741Updated 5 years ago
- Get unencrypted 'Saved Password' from Google Chrome☆738Updated 2 years ago
- PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.☆327Updated last year
- Collection of pentesting scripts☆439Updated 3 years ago
- Second Version of The GoBot Botnet, But more advanced.☆757Updated 4 years ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆503Updated last year
- ☆2,511Updated 3 years ago
- A Simple Ransomware Vaccine☆974Updated 2 years ago