KawaiiKillar / LoL-Account-Checker
☆42Updated this week
Related projects: ⓘ
- ☆37Updated this week
- ☆14Updated 2 years ago
- ProxyChecker Made in NodeJS☆36Updated 2 years ago
- This is a working variant of the Mirai IOT botnet☆13Updated last year
- ☆23Updated this week
- Tool to retrieve Config from Redline C2 servers☆16Updated last year
- ☆10Updated this week
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆40Updated 9 months ago
- ☆36Updated this week
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆20Updated 5 months ago
- Searches for employees of a company on linkedin, generates a list of possible emails and verifies them.☆39Updated 7 months ago
- Brute forcing login pages with SQL Injection queries with cURL☆17Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆39Updated 5 months ago
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆17Updated 2 years ago
- ☆19Updated this week
- i will upload all the books that helped me in learning in this repo☆19Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆34Updated 9 months ago
- Monitor your target continuously for new subdomains!☆26Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 2 years ago
- Create a malicious pip package (PoC)☆9Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆32Updated last year
- ☆14Updated this week
- ☆49Updated this week
- Boost website hits by generating requests from multiple proxy IPs.☆49Updated 6 months ago
- ☆24Updated 10 months ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆39Updated 2 years ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆74Updated last month
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated last year
- 🥊 ddos clustering☆40Updated last year
- Yet Another Memory Analyzer for malware detection☆24Updated last year
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆34Updated 9 months ago