9aylas / Backdooring-ZMM100-FingerPrint-DevicesLinks
AuthBypass & Auto Backdooring Devices
☆16Updated 6 years ago
Alternatives and similar repositories for Backdooring-ZMM100-FingerPrint-Devices
Users that are interested in Backdooring-ZMM100-FingerPrint-Devices are comparing it to the libraries listed below
Sorting:
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 5 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated last week
- Python - Metasploit-Framework Database Management☆16Updated 5 years ago
- All Zero Day Exploits☆21Updated 8 years ago
- Zero-Day Vulnerability in File Manager Plugin 6.7 ( CVE 2020-25213 )☆12Updated 2 years ago
- pen testing scripts☆12Updated 4 years ago
- Platform for a noob hacker to learn hacking on localhost.☆11Updated 9 years ago
- Just a quick'n'dirty tool to parse leaked databases (csv-like or sql format)☆23Updated 7 years ago
- Kill Any Antivirus Using Python For Windows Users .☆47Updated 9 years ago
- Repository of tools used in my blog☆52Updated last year
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆13Updated 4 years ago
- A Simple Keylogger with the ability of FTP Transfer and Local Storage☆20Updated last year
- WiFi-Jammer/DoS toolset☆62Updated 5 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Updated 4 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆25Updated 4 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 6 years ago
- Automated Mass Exploiter☆11Updated 6 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆55Updated 4 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Updated 12 years ago
- Easy to understand back door written in python☆36Updated 3 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 7 years ago
- HTTP botnet☆62Updated 9 years ago
- Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.☆20Updated 7 years ago
- Wordlists generated over the years of penetration testing☆13Updated 8 months ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- An Android spyware which interacts with a remote C&C server to exfiltrate phone data☆76Updated 5 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆33Updated 9 years ago
- Anubis 7.0☆27Updated last year
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago