FreakControl / CryptoChatLinks
NSA-Proof Secure P2P Chat client
☆11Updated 10 years ago
Alternatives and similar repositories for CryptoChat
Users that are interested in CryptoChat are comparing it to the libraries listed below
Sorting:
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Updated 7 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆23Updated 9 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆42Updated 7 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆47Updated 5 years ago
- Python script to generate a malicious MP4 file and start a CherryPy web server hosting a simple HTML page with the embedded file. Exploi…☆17Updated 10 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆48Updated 9 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- Simple php backdoor based on extension☆22Updated 10 years ago
- Remotely accessible Tor hidden service deployment suite☆24Updated 7 years ago
- Python implementation of the SlowLoris DoS attack.☆24Updated 8 years ago
- shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION☆40Updated 8 years ago
- Framework for Man-In-The-Middle attacks☆14Updated 7 years ago
- ☆11Updated 11 years ago
- Tool to create large numbers of phantom Bluetooth devices.☆30Updated 12 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆37Updated 12 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- Software exploitation training material☆16Updated 8 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Updated 6 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Updated 5 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Updated 10 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆58Updated 10 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Updated 9 years ago
- ☆24Updated 9 years ago
- 📡 A security research tool with shodan integration☆25Updated 7 years ago
- Chrome Crusader☆24Updated 6 years ago
- Small backdoor using cookie.☆63Updated 9 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 10 years ago