Malwareman007 / The_Hunter
It Map Social Media With Photo
☆27Updated 2 years ago
Alternatives and similar repositories for The_Hunter
Users that are interested in The_Hunter are comparing it to the libraries listed below
Sorting:
- All Type Of Tools written in multipule language .☆20Updated 2 years ago
- A Ransomware Based in AES256 Algorithm☆17Updated 2 years ago
- Lucifer is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python.☆19Updated 2 years ago
- POC Of CVE-2022-26937☆14Updated 2 years ago
- A POC OF CVE-2022-2274 (openssl)☆16Updated 2 years ago
- Proof of Concept of CVE-2022-30190☆37Updated 2 years ago
- TechViper is an advanced web security scanner designed to detect various vulnerabilities in web applications.☆18Updated 9 months ago
- POC OF CVE-2022-21970☆14Updated 2 years ago
- Movie Recommendation System based on machine learning concepts☆10Updated last year
- Config files for my GitHub profile.☆13Updated last year
- FAST WEB APPLICATION VULNERABILITY SCANNER written in python3☆20Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Updated last year
- IP-Finder is an Open Source Intelligence (OSINT) tool that helps collect IPs of Companies, Servers, Operating Systems and much more. It a…☆12Updated 3 years ago
- my mini collection of exploits and scripts for pentest☆12Updated 2 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- Reverse And Dorking Tools☆25Updated 4 years ago
- 「🚪」The hidden hookless backdoor☆12Updated 5 months ago
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆8Updated last year
- POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.☆17Updated 4 months ago
- python keylogger and spying malware .☆13Updated 3 weeks ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆9Updated last year
- Cracking protocols FTP and SSH.☆11Updated 9 months ago
- xdebug 2.5.5 RCE exploit☆30Updated 4 months ago
- Strumenti per Domini - Whois - IP - Data Breach - Email☆16Updated 6 months ago
- A WAF Bypass tool assisting in the use of SQLMap Tampers list according to specific WAF vendors.☆15Updated 2 years ago
- Remote persistent keylogger for Windows and Linux..☆12Updated 2 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Updated last year
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Updated 4 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆15Updated last year