Kleissner / BitSnailLinks
World's first Bitcoin client ddos software // Experimental program to exhaust inbound TCP connections of a Bitcoin node
☆24Updated 6 years ago
Alternatives and similar repositories for BitSnail
Users that are interested in BitSnail are comparing it to the libraries listed below
Sorting:
- A small TOR Onion Address harvester for checking if the address is available or not.☆78Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Updated 8 years ago
- pentest toolbox☆27Updated 3 years ago
- Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.☆32Updated 6 years ago
- pinky - The PHP mini RAT (Remote Administration Tool)☆77Updated 7 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆38Updated 6 years ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆12Updated 4 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26Updated 8 years ago
- ☆17Updated 6 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆53Updated 8 years ago
- pure python remote adb scanner + nmap scan module☆22Updated 7 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆125Updated 8 years ago
- ☆13Updated 8 years ago
- An advanced reverse shell written in Python3.☆21Updated 5 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆24Updated 7 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆50Updated 6 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 3 weeks ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Updated 6 years ago
- An0n 3xPloiTeR Shell☆35Updated 6 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆98Updated 3 years ago
- VNC pentest tool with bruteforce and ducky script execution features☆24Updated 8 years ago
- Red Login: SSH Brute-force Tools☆106Updated 7 years ago
- A simple python reverse shell written just for fun.☆62Updated 3 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆43Updated 7 years ago
- Quick script written for sorting and categorizing Shodan API keys acquired via scraping the internet.☆57Updated 2 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 7 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆18Updated 6 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 7 years ago
- imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basi…☆77Updated 6 years ago