FreakControl / CryptoChatLinks
NSA-Proof Secure P2P Chat client
☆10Updated 10 years ago
Alternatives and similar repositories for CryptoChat
Users that are interested in CryptoChat are comparing it to the libraries listed below
Sorting:
- The Python Password-Protected Obfuscator☆34Updated 6 years ago
- Python script to generate a malicious MP4 file and start a CherryPy web server hosting a simple HTML page with the embedded file. Exploi…☆17Updated 9 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION☆37Updated 8 years ago
- Bluetooth reverse shell.☆15Updated 4 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆36Updated 11 years ago
- Search the ExploitDB with a little more control☆21Updated 8 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 4 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆47Updated 8 years ago
- Yet Another Sniffer for monitoring network traffic☆85Updated 4 years ago
- Search Nmap and Metasploit scanning scripts.☆55Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- a simple, barely functional, prototyping RAT (Remote Administration Tool)☆9Updated 8 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆22Updated 9 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- Chrome Crusader☆25Updated 6 years ago
- A small TOR Onion Address harvester for checking if the address is available or not.☆77Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆12Updated 5 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- (In Progress) aims to develop an environment capable to simulate Botnet P2P Zeus,☆9Updated 10 years ago
- A fully featured backdoor that uses Gmail as a C&C server☆19Updated 9 years ago
- networked status aggregator sees all☆15Updated 4 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Universal LAN-based SSRF Attack Primitive☆19Updated 6 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 5 years ago
- My public exploit collection.☆31Updated 6 years ago