redcode-labs / neurax
A framework for constructing self-spreading binaries
☆1,009Updated last year
Alternatives and similar repositories for neurax:
Users that are interested in neurax are comparing it to the libraries listed below
- Golang malware development library☆946Updated 2 months ago
- ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication☆990Updated last year
- ☆367Updated 3 years ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,746Updated 2 years ago
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,108Updated last year
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,073Updated 3 years ago
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆1,761Updated 11 months ago
- C2/post-exploitation framework☆1,052Updated 3 years ago
- A tool for generating fake code signing certificates or signing real ones☆896Updated last year
- CrackQ: A Python Hashcat cracking queue system☆929Updated 5 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,786Updated last year
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,911Updated 2 years ago
- Statically-linked ssh server with reverse shell functionality for CTFs and such☆953Updated 2 years ago
- PowerShell ReverseTCP Shell - Framework☆1,053Updated 2 years ago
- ☆1,464Updated last year
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,826Updated 2 years ago
- Crack any Microsoft Windows users password without any privilege (Guest account included)☆1,127Updated last year
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victi…☆1,499Updated 3 months ago
- Some usefull Scripts and Executables for Pentest & Forensics☆1,104Updated 2 months ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,183Updated last year
- Fake Windows logon screen to steal passwords☆1,317Updated 5 years ago
- EXOCET - AV-evading, undetectable, payload delivery tool☆837Updated 2 years ago
- Template-Driven AV/EDR Evasion Framework☆1,630Updated last year
- Open source C2 server created for stealth red team operations☆797Updated 2 years ago
- A polyglot payload generator☆239Updated 2 years ago
- Secure Shell Bruteforcer — A faster & simpler way to bruteforce SSH server☆1,279Updated 3 years ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆486Updated 11 months ago
- Linux/Windows post-exploitation framework made by linux user☆1,488Updated this week
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,066Updated 2 years ago
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.☆1,473Updated 3 years ago