FreakControl / CryptoChatLinks
NSA-Proof Secure P2P Chat client
☆11Updated 10 years ago
Alternatives and similar repositories for CryptoChat
Users that are interested in CryptoChat are comparing it to the libraries listed below
Sorting:
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 7 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆23Updated 9 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Updated 7 years ago
- Bluetooth reverse shell.☆14Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Updated 6 years ago
- My public exploit collection.☆31Updated 7 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 5 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Updated 6 years ago
- Framework for Man-In-The-Middle attacks☆15Updated 7 years ago
- Python implementation of the SlowLoris DoS attack.☆24Updated 8 years ago
- Short little AV Test to check Detection Rates☆20Updated 5 years ago
- Python script to generate a malicious MP4 file and start a CherryPy web server hosting a simple HTML page with the embedded file. Exploi…☆17Updated 10 years ago
- Simple php backdoor based on extension☆22Updated 10 years ago
- DNS Botnet Server and Client☆34Updated 5 months ago
- 📡 A security research tool with shodan integration☆25Updated 7 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆13Updated 8 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Updated 3 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Updated 8 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 7 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 8 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Updated 8 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆48Updated 9 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- Proxy scraper for proxychains☆43Updated 5 years ago
- Universal LAN-based SSRF Attack Primitive☆19Updated 6 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆38Updated 8 years ago
- ☆20Updated 12 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆16Updated 9 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago