DeadNumbers / hikka-x86Links
IP camera bruteforcer, 32 bit version
☆14Updated 9 years ago
Alternatives and similar repositories for hikka-x86
Users that are interested in hikka-x86 are comparing it to the libraries listed below
Sorting:
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆35Updated 5 years ago
- Hikvision IP-cam Bruteforce☆23Updated 2 years ago
- A tool for recover router password☆30Updated 6 years ago
- This is the ToRat client, a part of the ToRat Project.☆26Updated 5 years ago
- Cpanel Brute Force Tool (Perl)☆16Updated 11 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- All xxx-arsenal repos in one☆15Updated 6 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆11Updated 7 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 3 years ago
- This is the ToRat server, a part of the ToRat Project.☆23Updated 5 years ago
- PRESTASHOP Modules Shell Exploit☆11Updated 7 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- The great patator tool compiled for Windows☆26Updated 8 years ago
- Wardriving ekoparty☆15Updated 7 years ago
- pentest toolbox☆28Updated 2 years ago
- Scripts and tools for ISM hacking☆15Updated 7 years ago
- Tor bridge running obfs4 obfuscation protocol in Alpine 🐳☆8Updated last year
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆23Updated 7 years ago
- Stealer of sessions of the Telegram Desktop application on windows 7, 8 and 10 🔑☆9Updated 4 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 8 years ago
- Build a search engine from nmap XML files☆20Updated 10 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- A first look at browser-based Cryptojacking☆16Updated 6 years ago
- Python libraries for Windows system coding☆14Updated 5 years ago
- Packet sniffer using scapy☆18Updated 5 years ago