Python botnet
☆12Aug 15, 2015Updated 10 years ago
Alternatives and similar repositories for Lucifer
Users that are interested in Lucifer are comparing it to the libraries listed below
Sorting:
- nmap nse script for scan a whole country☆13Jun 28, 2022Updated 3 years ago
- Botnet IRC C&C Created in python language, developed for language learning☆11May 26, 2016Updated 9 years ago
- Raspberry Pi scripts for Bluetooth NAP service☆29Jul 12, 2014Updated 11 years ago
- Universal text data encryption and decryption tool based on AES-256 CBC. Encrypt text or custom files. Privacy secure encryption in your …☆27Dec 16, 2024Updated last year
- a social cms based on node.js and mongodb☆30Feb 22, 2012Updated 14 years ago
- Roguelite multiplayer hack 'n slash dungeon crawler created for our school's 2021-2022 year long project.☆18Apr 21, 2022Updated 3 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- A script to create, mount and umount LUKS encrypted disk image files.☆17Jun 24, 2024Updated last year
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- ☆12Jun 26, 2024Updated last year
- ☆13Jun 29, 2023Updated 2 years ago
- ☆10Aug 7, 2024Updated last year
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- python script that hide phishing url like a pro "masking url technique"☆43Jul 21, 2021Updated 4 years ago
- initial commit☆44Nov 19, 2024Updated last year
- Simple tool to view all passwords of WiFi networks saved in Windows☆12Sep 7, 2025Updated 5 months ago
- ☆14Jul 26, 2025Updated 7 months ago
- Linux kernel-mode and user-space with wine/MinGW/Windows compability hacking library.☆12Sep 15, 2022Updated 3 years ago
- IDAPython-1.0.0 patches and .def file needed to build for IDA 5.0 free☆11Feb 20, 2015Updated 11 years ago
- a markov based rule generator for hashcat/mdxfind/jtr☆24Dec 8, 2025Updated 2 months ago
- ☆11Dec 8, 2023Updated 2 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- ☆11Sep 26, 2021Updated 4 years ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 10 months ago
- How to make a rocket catch a target?☆11Aug 6, 2017Updated 8 years ago
- Runs tscircuit code inside a webworker, view PCBs, schematics and 3D previews☆16Updated this week
- Build wordlists from the common-crawl index☆12Oct 9, 2022Updated 3 years ago
- ☆10Sep 19, 2016Updated 9 years ago
- Use network sockets together with the Haskell pipes library.☆25Apr 16, 2022Updated 3 years ago
- Machine Leaning Approaches for Classification of Children with Autism Spectrum Disorder☆13Aug 18, 2020Updated 5 years ago
- EWDK C++ toolchain for bazel☆11Feb 1, 2026Updated last month
- A secure, beautiful, and highly customizable lockscreen with optional full-vault encryption for the notes app obsidian.☆18Oct 18, 2025Updated 4 months ago
- ☆10May 28, 2022Updated 3 years ago
- OAuth 2.0 and OIDC Facilities for Pedestal web applications☆10Jan 24, 2024Updated 2 years ago
- Decrypt passwords/cookies/history/bookmarks from the browser. 一款可全平台运行的浏览器数据导出解密工具。☆11Nov 28, 2022Updated 3 years ago
- ☆12Apr 26, 2022Updated 3 years ago