Mr6MJT / CYBOST
Open source linux-based-toolkit for basic cyber security students, social engineers, linux users....
☆20Updated last year
Alternatives and similar repositories for CYBOST:
Users that are interested in CYBOST are comparing it to the libraries listed below
- Open source Linux chatting software, works on all linux distros.☆8Updated last year
- XSSLab is vulnerable 'xss' website That can help you to improve your hacking and bug hunting skills.☆7Updated last year
- By this Simple WebShell you can exploit File Upload vulnerability and execute command in the vulnerable web server.☆3Updated 3 years ago
- Simple Port Scanner coded by me,using C++ and socket API.☆7Updated 3 years ago
- My First Web Page, It's About if You Should learn Binary Exploitation in 2022.☆21Updated 3 years ago
- ☆6Updated 3 years ago
- Moverse's Official Website☆9Updated 3 years ago
- Input/Output Assembly Header coded by me.☆10Updated last year
- A Key Calculation Based Program For Data Confidentiality Over A Steganography-Like Technique Using The ROT Algorithm☆23Updated 3 years ago
- Linux-Based Reverse Shell Builder For Linux Penetration Testers☆43Updated 3 years ago
- Golang malware development library☆19Updated 3 years ago
- Cleny is An Interpreted Coding Language Used To Facilitate UI Structuring And Styling For CLI Based Projects☆110Updated 2 years ago
- Multiple Of Scripts Useful For System Administration In Linux Servers & Distributions, Driven By a Fast Easy-to-Use Menu Script☆51Updated 3 years ago
- These are some books that will help you in your learning,I got them in my cyber security career, These books for: pentesting, programming…☆42Updated 3 years ago
- Library For Creating Local & Remote Procedure Calls Between Different Running Processes☆84Updated last year
- Activation For Burpsuite Professional By UNCIA☆12Updated 2 years ago
- V7x Fishing Tool☆44Updated last year
- Complete Python RansomeWare Source Code With Full Decoumetions.☆217Updated 2 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆130Updated last year
- A simple Telegraph clone with new features, allowing article publishing and management.☆8Updated 2 months ago
- FUD metasploit Persistence RAT☆4Updated 2 years ago
- Cheatsheet to exploit and learn SQL Injection.☆138Updated 2 years ago
- anonymous spam E-mail sender☆22Updated 3 years ago
- A Hidden and Undetectable Remote Access Tool written in C++ and Server in Python3.☆64Updated last year
- Simple C# malware that steals Discord token from .ldb files and from memory☆60Updated 3 years ago
- XSS scanner that detects Cross-Site Scripting vulnerabilities in website by injecting malicious scripts☆124Updated 4 years ago
- Automatically create an fake account and star a repository.☆15Updated 6 years ago
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆185Updated last year
- Redirect All Traffic Through Tor Network For Kali Linux☆181Updated 2 weeks ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆60Updated 3 years ago