All Projects → Brutus → Similar Projects or Alternatives

1054 Open source projects that are alternatives of or similar to Brutus

Beef Over Wan
Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (+382.35%)
Ghost
👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (+1735.29%)
Mutual labels:  malware, trojan, botnet
Powershell Rat
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+3641.18%)
trolo
trolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (+164.71%)
Mutual labels:  malware, trojan, hacking-tool
Serpentine
C++/Win32/Boost Windows RAT (Remote Administration Tool) with a multiplatform Java/Spring RESTful C2 server and Go, C++/Qt5 frontends
Stars: ✭ 216 (+1170.59%)
Mutual labels:  penetration-testing, malware, trojan
The-MALWARE-Repo
A repository full of malware samples.
Stars: ✭ 380 (+2135.29%)
Mutual labels:  malware, trojan
maalik
Feature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (+341.18%)
Mutual labels:  malware, penetration-testing
MalwareDatabase
One of the few malware collection
Stars: ✭ 37 (+117.65%)
Mutual labels:  malware, trojan
Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+4164.71%)
Mutual labels:  malware, hacking-tool
Deep-Inside
Command line tool that allows you to explore IoT devices by using Shodan API.
Stars: ✭ 22 (+29.41%)
M-Botnet
A C2 project that controls a self-propagating MS17-010 worm.
Stars: ✭ 39 (+129.41%)
Mutual labels:  botnet, malware
TeleShadow2
TeleShadow - Telegram Desktop Session Stealer (Windows)
Stars: ✭ 88 (+417.65%)
Mutual labels:  malware, trojan
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+42523.53%)
TokenBreaker
JSON RSA to HMAC and None Algorithm Vulnerability POC
Stars: ✭ 51 (+200%)
Lime Rat
LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)
Stars: ✭ 663 (+3800%)
Mutual labels:  malware, trojan
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (+164.71%)
Webspoilt
This script will you help to find the information about the website and to help in penetrating testing
Stars: ✭ 34 (+100%)
Brutus
Botnet targeting Windows machines written entirely in Python & open source security project.
Stars: ✭ 37 (+117.65%)
Mutual labels:  botnet, hacking-tool
KeyPlexer
Capstone: Keylogger Trojan
Stars: ✭ 32 (+88.24%)
Mutual labels:  malware, trojan
chrome-crusader
Chrome Crusader
Stars: ✭ 24 (+41.18%)
Mutual labels:  botnet, malware
Engine
Droidefense: Advance Android Malware Analysis Framework
Stars: ✭ 386 (+2170.59%)
Mutual labels:  malware, trojan
Cerberus
一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能
Stars: ✭ 389 (+2188.24%)
Paradoxiarat
ParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 395 (+2223.53%)
Mutual labels:  hacking-tool, botnet
Gobot2
Second Version of The GoBot Botnet, But more advanced.
Stars: ✭ 431 (+2435.29%)
Mutual labels:  malware, botnet
Emp3r0r
linux post-exploitation framework made by linux user
Stars: ✭ 419 (+2364.71%)
Mutual labels:  malware, hacking-tool
Fireelf
fireELF - Fileless Linux Malware Framework
Stars: ✭ 435 (+2458.82%)
Mutual labels:  malware, exploitation-framework
Evillimiter
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+4394.12%)
Ashok
Ashok is a OSINT Recon Tool , a.k.a 😍 Swiss Army knife .
Stars: ✭ 109 (+541.18%)
ConTroll Remote Access Trojan
Created a VERY SIMPLE remote access Trojan that will establish administrative control over any windows machine it compromises.
Stars: ✭ 69 (+305.88%)
Mutual labels:  malware, trojan
cerberus research
Research tools for analysing Cerberus banking trojan.
Stars: ✭ 110 (+547.06%)
Mutual labels:  malware, trojan
WPCracker
WordPress pentest tool
Stars: ✭ 34 (+100%)
anubis
Captive wifi hotspot bypass tool for Linux
Stars: ✭ 46 (+170.59%)
Red-Rabbit-V4
The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate other peoples tools like the aircrack suite or the wifite framework, it rather has its own code and is raw source with over 270+ options. This framework might just be your everyday key to your workflow
Stars: ✭ 123 (+623.53%)
paradoxiaRAT
ParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 583 (+3329.41%)
Mutual labels:  botnet, hacking-tool
aquatone
A Tool for Domain Flyovers
Stars: ✭ 43 (+152.94%)
cms identify
cms识别
Stars: ✭ 13 (-23.53%)
Memz
A trojan made for Danooct1's User Made Malware Series.
Stars: ✭ 524 (+2982.35%)
Mutual labels:  malware, trojan
trj
Execute any command in other's computer using a trojan horse coded and compiled in C. Just for educational purpose.
Stars: ✭ 21 (+23.53%)
Mutual labels:  trojan, hacking-tool
Malware-with-Backdoor-and-Keylogger
👨🏻‍💻 A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.
Stars: ✭ 25 (+47.06%)
Mutual labels:  malware, hacking-tool
RoboThief-Telegram-Session-Stealer
Robo Thief is a software for steal telegram session .
Stars: ✭ 18 (+5.88%)
Mutual labels:  malware, trojan
Hack-Utils
Script to facilitate different functions and checks
Stars: ✭ 27 (+58.82%)
Mutual labels:  malware, hacking-tool
awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (+341.18%)
Thefatrat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Stars: ✭ 5,944 (+34864.71%)
Mutual labels:  malware, trojan
Lockdoor Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+3882.35%)
Cheatsheet God
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Stars: ✭ 3,521 (+20611.76%)
Xeexe Topantivirusevasion
Undetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (+2176.47%)
Mutual labels:  malware, hacking-tool
Adamantium Thief
🔑 Decrypt chromium based browsers passwords, cookies, credit cards, history, bookmarks, autofill. Version > 80 is supported.
Stars: ✭ 283 (+1564.71%)
Mutual labels:  malware, trojan
Hosthunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+2411.76%)
Trojancockroach
A Stealthy Trojan Spyware
Stars: ✭ 424 (+2394.12%)
Mutual labels:  malware, trojan
Hacker Roadmap
📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+45500%)
Osmedeus
Fully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+19847.06%)
Hackerpro
All in One Hacking Tool for Linux & Android (Termux). Make your linux environment into a Hacking Machine. Hackers are welcome in our blog
Stars: ✭ 474 (+2688.24%)
Thc Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+2688.24%)
Vhostscan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+4411.76%)
Linux.mirai
Leaked Linux.Mirai Source Code for Research/IoC Development Purposes
Stars: ✭ 466 (+2641.18%)
Mutual labels:  malware, botnet
Unencrypted Backdoor With Process Cloaking
Unencrypted backdoor
Stars: ✭ 16 (-5.88%)
Mutual labels:  malware, trojan
ToxicEye
👽 Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (+1694.12%)
Mutual labels:  malware, trojan
Aoyama
A New version of Python3 botnet, old version: http://github.com/Leeon123/Python3-botnet
Stars: ✭ 161 (+847.06%)
Mutual labels:  botnet, trojan
Remot3d
Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors
Stars: ✭ 263 (+1447.06%)
Mutual labels:  malware, trojan
Sn1per
Attack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+28705.88%)
1-60 of 1054 similar projects