redcode-labs / neurax
A framework for constructing self-spreading binaries
☆999Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for neurax
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆1,700Updated 8 months ago
- Golang malware development library☆934Updated 7 months ago
- A tool for generating fake code signing certificates or signing real ones☆879Updated last year
- Fake Windows logon screen to steal passwords☆1,297Updated 4 years ago
- Secure Shell Bruteforcer — A faster & simpler way to bruteforce SSH server☆1,268Updated 2 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,044Updated 3 years ago
- ☆368Updated 3 years ago
- CrackQ: A Python Hashcat cracking queue system☆923Updated 2 months ago
- ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication☆978Updated last year
- Research code & papers from members of vx-underground.☆1,146Updated 2 years ago
- ☆1,464Updated 9 months ago
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,096Updated last year
- Get unencrypted 'Saved Password' from Google Chrome☆724Updated last year
- 🔪 Leak git repositories from misconfigured websites☆1,552Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,740Updated last year
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,725Updated last year
- A Simple Ransomware Vaccine☆944Updated last year
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.☆1,424Updated 3 years ago
- PowerShell ReverseTCP Shell - Framework☆1,041Updated 2 years ago
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,309Updated 4 years ago
- EXOCET - AV-evading, undetectable, payload delivery tool☆832Updated 2 years ago
- Network Analysis Tool☆3,026Updated last year
- Crack any Microsoft Windows users password without any privilege (Guest account included)☆1,103Updated last year
- Tool for especially scanning nearby devices and execute a given command on its own system while the target device comes in range.☆355Updated 2 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆2,843Updated 6 months ago
- C2/post-exploitation framework☆1,029Updated 3 years ago