P0cL4bs / ThanosLinks
Thanos is a tool made for scan a range of IP's and get the banners of the running services. The main function is do banner grabber, but you also can use this for exploit vulnerabilities, find proxy servers, or simply check for open ports.
☆44Updated 9 years ago
Alternatives and similar repositories for Thanos
Users that are interested in Thanos are comparing it to the libraries listed below
Sorting:
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- ☆54Updated 8 years ago
- A python script for obfuscating wireless networks☆79Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- A shell / chat bot for XMPP and cloud services☆48Updated 9 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Updated 9 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- SSH Based Remote Administration Tool☆104Updated 10 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- 0x88 exploit pack Decoded☆28Updated 11 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- A python based https remote access trojan for penetration testing☆84Updated 9 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 12 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 12 years ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆87Updated 9 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 11 years ago
- Some NSE scripts to search information from routers☆36Updated 9 years ago