DeadNumbers / hikka-x86
IP camera bruteforcer, 32 bit version
☆14Updated 9 years ago
Alternatives and similar repositories for hikka-x86:
Users that are interested in hikka-x86 are comparing it to the libraries listed below
- This is the ToRat client, a part of the ToRat Project.☆27Updated 5 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆35Updated 5 years ago
- Hikvision IP-cam Bruteforce☆21Updated 2 years ago
- A tool for recover router password☆29Updated 6 years ago
- The great patator tool compiled for Windows☆26Updated 8 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆24Updated 6 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆13Updated 8 years ago
- A web app scanner☆26Updated 11 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆22Updated 6 years ago
- This is the ToRat server, a part of the ToRat Project.☆23Updated 5 years ago
- Domain Seeker☆12Updated last year
- Capturing audio (.wav) from target using a link☆12Updated 5 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆11Updated 7 years ago
- PoC Remote Administration Tool☆11Updated 5 years ago
- Reverse shell for remote administration☆30Updated 7 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- module for certexfil☆15Updated 2 years ago
- :e-mail: Enumerate usernames through SMTP service☆18Updated 5 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Updated 5 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 3 years ago
- pentest toolbox☆28Updated 2 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆9Updated 6 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Updated 7 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Google dorks generator to find open shells (on government sites)☆30Updated 10 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 8 years ago
- ARP ping detector on local network☆15Updated 12 years ago