P0cL4bs / ThanosLinks
Thanos is a tool made for scan a range of IP's and get the banners of the running services. The main function is do banner grabber, but you also can use this for exploit vulnerabilities, find proxy servers, or simply check for open ports.
☆45Updated 9 years ago
Alternatives and similar repositories for Thanos
Users that are interested in Thanos are comparing it to the libraries listed below
Sorting:
- Reverse NTP remote access trojan in python, for penetration testers☆62Updated 10 years ago
- A python script for obfuscating wireless networks☆79Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆87Updated 10 years ago
- ☆54Updated 8 years ago
- SSH Based Remote Administration Tool☆103Updated 10 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- A shell / chat bot for XMPP and cloud services☆49Updated 10 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 11 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- A python based https remote access trojan for penetration testing☆84Updated 9 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 12 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 10 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79Updated 8 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Projects and POCs☆61Updated 11 years ago
- Post Exploitation Linux Toolkit☆33Updated 9 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆30Updated 9 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 10 years ago
- LD_PRELOAD rootkit☆24Updated 11 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30Updated 9 years ago
- Exploits and research stuffs☆54Updated 2 months ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 12 years ago
- 0x88 exploit pack Decoded☆27Updated 11 years ago