Kleissner / BitSnailLinks
World's first Bitcoin client ddos software // Experimental program to exhaust inbound TCP connections of a Bitcoin node
☆24Updated 5 years ago
Alternatives and similar repositories for BitSnail
Users that are interested in BitSnail are comparing it to the libraries listed below
Sorting:
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 10 months ago
- pentest toolbox☆28Updated 2 years ago
- Modern Javascript keylogger with web panel☆22Updated 5 years ago
- Quick and simple alghorithm to search in leaks very fast mode☆11Updated 6 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 7 years ago
- A default credential scanner.☆9Updated 6 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 4 years ago
- A SMTP Checker / SMTP Cracker with SOCKS support and e-mail delivery test (inbox check) for mailpass combolists.☆14Updated 3 years ago
- An advanced reverse shell written in Python3.☆21Updated 4 years ago
- pure python remote adb scanner + nmap scan module☆21Updated 6 years ago
- ☆13Updated 7 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Create Containerized Clearnet Proxies☆31Updated 6 years ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆13Updated 3 years ago
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Updated 4 years ago
- edge --> powerpoint --> remote-file --> shell☆12Updated 6 years ago
- An0n 3xPloiTeR Shell☆35Updated 5 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆19Updated 3 years ago
- AIL framework - Analysis Information Leak framework