DedSecInside / ViPER-CLI
Command Line Interface of ViPER Pen Testing tool.
☆14Updated 8 years ago
Alternatives and similar repositories for ViPER-CLI:
Users that are interested in ViPER-CLI are comparing it to the libraries listed below
- DES Encrypter/Decrypter☆17Updated 8 years ago
- Web App Pen Tester (Web Interface)☆31Updated 2 years ago
- Key Logger with UI☆40Updated 8 years ago
- An index which uses 'spiders' to crawl and explore every discoverable hidden service on Tor.☆9Updated 6 years ago
- A python tool that will extract exif data from picture with two methods☆37Updated 3 years ago
- Collection of cracked malware☆14Updated 6 years ago
- web information gathering / Grab links☆42Updated 5 years ago
- Simple (but working) WEP/WPA/WPA2 Hacking script☆30Updated 8 years ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆17Updated 6 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- pen testing scripts☆11Updated 4 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆24Updated 6 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 7 years ago
- Malicious Software SRC Extract☆30Updated 2 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Updated 8 years ago
- pentest toolbox☆28Updated 2 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- An tool for search IOT MQTT vulnerable with shodan☆19Updated 7 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆35Updated 5 years ago
- Simple security surveillance script for linux distributions.☆58Updated 8 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Updated 3 years ago
- Arduino's version of Rubber ducky project watched in mr robot (based on https://www.hak5.org/blog/15-second-password-hack-mr-robot-style)☆34Updated 7 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Updated 8 years ago
- Sends some one a malicious payload through smtp and starts a listener with metasploit.☆35Updated 7 years ago
- Tool for sniffing Recent activity as well as payload of SMS and future types of communications on Android devices.☆29Updated 11 years ago
- Anubis Malware Samples☆19Updated 3 years ago
- A copy of articles published at Peerlyst☆39Updated 8 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago