log file scrubber
☆15Jul 27, 2018Updated 7 years ago
Alternatives and similar repositories for soapy
Users that are interested in soapy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Sep 2, 2018Updated 7 years ago
- Download files out of open AWS buckets☆38Dec 12, 2018Updated 7 years ago
- Python utility to export a user's starred repositories list into a CSV file☆17May 3, 2018Updated 7 years ago
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago
- Bitcoin miner by Raphael Frajuca(Badguy5552)☆11Oct 10, 2017Updated 8 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆49May 3, 2017Updated 8 years ago
- A tool for performing an initial information-gathering scan of websites for penetration tests.☆24Aug 27, 2019Updated 6 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆180Jan 29, 2019Updated 7 years ago
- Tunnel IP over ICMP.☆16Jul 13, 2016Updated 9 years ago
- Automatically "block" people in images (like Black Mirror) using a pretrained neural network.☆23Mar 31, 2018Updated 7 years ago
- ☆19Jun 8, 2021Updated 4 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- Scrape real-time Dark Web data across Tor to your local kafka network☆14Mar 10, 2016Updated 10 years ago
- Debian live build for the Pocket-Kali☆41May 16, 2018Updated 7 years ago
- A simple XSS finding tool☆111Nov 9, 2018Updated 7 years ago
- Content from THOTCON 0xa talk☆10May 5, 2019Updated 6 years ago
- Rust on the Quansheng UV-K5 Radio☆10Jul 9, 2024Updated last year
- Automatically converts your firefox browser into a hacking tool by installing required plugins.☆12Jun 26, 2017Updated 8 years ago
- 🀄️ WebShell Backdoor Framework☆16Jun 7, 2018Updated 7 years ago
- PowerShell Obfuscator☆11Jul 21, 2022Updated 3 years ago
- Reversing Google Drive and other goodies ;)☆27Sep 26, 2013Updated 12 years ago
- A modular pentesting framework implemented in C☆13Aug 6, 2018Updated 7 years ago
- pass game protect☆12Apr 26, 2014Updated 11 years ago
- Python backdoor that uses http post/get requests to communicate☆42Aug 24, 2016Updated 9 years ago
- Windows hidden thread suspend POC with code injection☆12May 27, 2017Updated 8 years ago
- A collection of Dockerfile examples for various programming languages, frameworks and package managers.☆14Mar 17, 2026Updated last week
- Arduino based laser controller☆13Apr 18, 2014Updated 11 years ago
- android got hook under version 5.0☆12Jun 13, 2019Updated 6 years ago
- stdin writes to slack☆14Feb 8, 2020Updated 6 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- A script for generating custom passphrase lists to be used for password cracking with hashcat rules☆81Jun 27, 2018Updated 7 years ago
- Kubectl extension to create secrets by taking input from the console☆24Oct 8, 2021Updated 4 years ago
- rnsh is a command-line utility written in Python that facilitates shell sessions over Reticulum networks and aims to provide a similar ex…☆13Jan 6, 2026Updated 2 months ago
- QR designer web app with a novel method of designing qr codes that does not take advantage of error correction☆10Sep 24, 2024Updated last year