Uses Shodan to locate HackingTeam C&C Servers.
☆78Jul 14, 2015Updated 10 years ago
Alternatives and similar repositories for TheItalianJob
Users that are interested in TheItalianJob are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- Tools to help detect Hacking Team malware☆79Jul 24, 2015Updated 10 years ago
- Quick scan to find live hosts on the network/across networks☆48Jul 4, 2014Updated 11 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Mar 6, 2018Updated 8 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- Packet Knock-Out is an exploration in a method of data exfiltration via packet port numbers.☆14Sep 18, 2016Updated 9 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- Peach Fuzzer Web Frontend☆51Jun 10, 2021Updated 4 years ago
- zer0m0n driver for cuckoo sandbox☆23Feb 24, 2015Updated 11 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Some NSE scripts to search information from routers☆36Nov 30, 2015Updated 10 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Feb 17, 2015Updated 11 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 9 years ago
- Simple python client to upload files to the transfer.sh service☆10Dec 19, 2016Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Mar 26, 2016Updated 10 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆71Dec 5, 2014Updated 11 years ago
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- lte security☆42Nov 17, 2015Updated 10 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Apr 21, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Infecting PE☆25Mar 10, 2014Updated 12 years ago
- A demo of Grape mounted behind a Goliath web server.☆46Nov 3, 2018Updated 7 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Jul 2, 2014Updated 11 years ago
- Mainframe bruter and screen automation utility.☆42Sep 28, 2014Updated 11 years ago
- Web Interface Portal & Security Threat Engine for REMnux☆24Aug 1, 2016Updated 9 years ago
- A Docker container for Moloch based on minimal Debian☆26Jan 25, 2016Updated 10 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆42Nov 24, 2014Updated 11 years ago
- Unpacking tool for Inno Setup installers☆40Mar 9, 2024Updated 2 years ago
- A TE executable format loader for IDA☆28Sep 14, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- spectrum monitoring system for GSM providers☆44Jan 10, 2016Updated 10 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- This version touches disk for registry persistence.☆27Oct 6, 2015Updated 10 years ago
- Deprecated please use https://github.com/Netflix/sleepy-puppy☆96Aug 23, 2018Updated 7 years ago
- REST API based malware repository (abandoned)☆107Apr 4, 2015Updated 11 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago