World's first Bitcoin client ddos software // Experimental program to exhaust inbound TCP connections of a Bitcoin node
☆24Jul 24, 2019Updated 6 years ago
Alternatives and similar repositories for BitSnail
Users that are interested in BitSnail are comparing it to the libraries listed below
Sorting:
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆11May 25, 2019Updated 6 years ago
- Disabling Windows Defender & downloading payload☆21Jul 28, 2020Updated 5 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆13Jul 8, 2019Updated 6 years ago
- RTSPServer Code Execution Vulnerability CVE-2018-4013☆15Nov 26, 2018Updated 7 years ago
- Framework for exploiting local vulnerabilities☆83Nov 18, 2023Updated 2 years ago
- Webmin Remote Code Execution (authenticated)☆33Sep 1, 2019Updated 6 years ago
- A tool to generate OpenXML XXE Payloads written in Python3.☆16Aug 21, 2019Updated 6 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- C# Admin Control Panel Finder For Windows☆46Sep 23, 2019Updated 6 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- An advance keylogger that works and also logs special keys.☆16May 27, 2022Updated 3 years ago
- Plugin-based obfuscator☆14Jun 13, 2019Updated 6 years ago
- CVE-2019-0708 - BlueKeep (RDP)☆40Jun 14, 2020Updated 5 years ago
- Is command prompt blocked on your school/work computers? Here is an easy fix!☆21Sep 19, 2019Updated 6 years ago
- Essential tool for finding blind injection attacks.☆50Feb 6, 2019Updated 7 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- SqlMap_BurpSuite☆51Aug 15, 2019Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 6 years ago
- ☆22Apr 12, 2019Updated 6 years ago
- Ospy is a penetration testing tool for macOS, include keylogger, live screen catcher, reveres shell and more. Developed in c☆24May 18, 2019Updated 6 years ago
- Vulnerabilities which found in Oracle products☆33Apr 17, 2019Updated 6 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 6 years ago
- CVE-2019-10149 : A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message(…☆19Jun 4, 2021Updated 4 years ago
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago
- Eternalblue-Doublepulsar without Metasploit or python☆53May 30, 2019Updated 6 years ago
- ios kernel class tree☆23May 30, 2019Updated 6 years ago
- Zimbra RCE PoC - CVE-2019-9670 XXE/SSRF☆27Aug 16, 2019Updated 6 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- [C# & Rust] An implementation of efficient, shared, concurrent and permanent storage of objects in unmanaged memory in static, non-changi…☆27Oct 11, 2025Updated 4 months ago