redcode-labs / neuraxLinks
A framework for constructing self-spreading binaries
☆1,018Updated last year
Alternatives and similar repositories for neurax
Users that are interested in neurax are comparing it to the libraries listed below
Sorting:
- Golang malware development library☆975Updated 10 months ago
- ☆374Updated 2 months ago
- C2/post-exploitation framework☆1,095Updated 4 years ago
- Get unencrypted 'Saved Password' from Google Chrome☆735Updated 2 years ago
- A tool for generating fake code signing certificates or signing real ones☆950Updated 2 years ago
- ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication☆1,008Updated 2 years ago
- CrackQ: A Python Hashcat cracking queue system☆939Updated last year
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,196Updated 5 months ago
- ☆1,464Updated last year
- 🔪 Leak git repositories from misconfigured websites☆1,586Updated 2 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,949Updated 2 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,156Updated 4 years ago
- Tool for especially scanning nearby devices and execute a given command on its own system while the target device comes in range.☆378Updated 3 years ago
- Fake Windows logon screen to steal passwords☆1,369Updated 5 years ago
- A collection of source code for various RATs, Stealers, and other Trojans.☆449Updated 6 years ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,785Updated 2 years ago
- Crack any Microsoft Windows users password without any privilege (Guest account included)☆1,153Updated last year
- Secure Shell Bruteforcer — A faster & simpler way to bruteforce SSH server☆1,310Updated 3 years ago
- EXOCET - AV-evading, undetectable, payload delivery tool☆845Updated 3 years ago
- ParadoxiaRat : Native Windows Remote access Tool.☆810Updated 2 years ago
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆1,925Updated last year
- A collection of source code for various botnets.☆560Updated 6 years ago
- A GNU/Linux monitoring and profiling tool focused on single processes.☆673Updated 3 years ago
- Research code & papers from members of vx-underground.☆1,309Updated 3 years ago
- Python AV Evasion Tools☆522Updated 2 weeks ago
- Second Version of The GoBot Botnet, But more advanced.☆747Updated 4 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆3,003Updated last year
- PoC exploits for software vulnerabilities☆682Updated 4 years ago
- ☆2,506Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,465Updated 3 years ago