From e6177501adc517f0348fe94359afdc696853ba99 Mon Sep 17 00:00:00 2001 From: Abdullah Sarwar Date: Wed, 26 Nov 2025 02:42:58 +0500 Subject: [PATCH] RENAME TO FOLDER --- {DLL => DEPENDENCIES}/cacert.pem | 0 {DLL => DEPENDENCIES}/libcrypto-1_1-x64.dll | Bin {DLL => DEPENDENCIES}/libssl-1_1-x64.dll | Bin {DLL => DEPENDENCIES}/pcre64.dll | Bin README.md | 2 -- compiler.py | 2 +- 6 files changed, 1 insertion(+), 3 deletions(-) rename {DLL => DEPENDENCIES}/cacert.pem (100%) rename {DLL => DEPENDENCIES}/libcrypto-1_1-x64.dll (100%) rename {DLL => DEPENDENCIES}/libssl-1_1-x64.dll (100%) rename {DLL => DEPENDENCIES}/pcre64.dll (100%) diff --git a/DLL/cacert.pem b/DEPENDENCIES/cacert.pem similarity index 100% rename from DLL/cacert.pem rename to DEPENDENCIES/cacert.pem diff --git a/DLL/libcrypto-1_1-x64.dll b/DEPENDENCIES/libcrypto-1_1-x64.dll similarity index 100% rename from DLL/libcrypto-1_1-x64.dll rename to DEPENDENCIES/libcrypto-1_1-x64.dll diff --git a/DLL/libssl-1_1-x64.dll b/DEPENDENCIES/libssl-1_1-x64.dll similarity index 100% rename from DLL/libssl-1_1-x64.dll rename to DEPENDENCIES/libssl-1_1-x64.dll diff --git a/DLL/pcre64.dll b/DEPENDENCIES/pcre64.dll similarity index 100% rename from DLL/pcre64.dll rename to DEPENDENCIES/pcre64.dll diff --git a/README.md b/README.md index 83034e4..c5659d9 100644 --- a/README.md +++ b/README.md @@ -1,5 +1,3 @@ -## Overview - **RABIDS** (Roving Autonomous Bartmoss Interface Drones) is a comprehensive framework for building custom offensive security payloads. It provides a powerful yet intuitive graphical interface to chain together various modules—such as ransomware, clipboard hijackers, and persistence loaders—into a single, compiled executable for Windows, Linux, or macOS. This tool is designed for security researchers, red teamers, and educational purposes to simulate advanced adversaries and study malware behavior in a controlled environment. diff --git a/compiler.py b/compiler.py index d810f31..c36f39a 100644 --- a/compiler.py +++ b/compiler.py @@ -418,7 +418,7 @@ def main(): target_os, target_arch = parse_target(args.target) script_dir = Path(__file__).parent.resolve() - dll_source_dir = script_dir / 'DLL' +dll_source_dir = script_dir / 'DEPENDENCIES' MODULE_DLLS = { 'MODULE/ctrlvamp.nim': {'pcre64DllData_b64': 'pcre64.dll'},