R3tr074 / Burn-Byte
Burn Byte is a modern and powerful DDOS Toolkit
☆38Updated 3 years ago
Alternatives and similar repositories for Burn-Byte:
Users that are interested in Burn-Byte are comparing it to the libraries listed below
- All next level week tracks☆11Updated 4 years ago
- 🔨 Linux Hash Cracker☆32Updated 8 months ago
- Windows Reverse TCP backdoor☆29Updated 5 years ago
- ☆20Updated 2 months ago
- Malware and malicious applications database☆37Updated 9 months ago
- Malware feito em C com algumas funções "extras" como um keylogger☆17Updated 4 years ago
- This is a cpu tool for testing the floating-points peak performance. Now it supports linux and x86-64 platform. It can automatically reco…☆20Updated 4 years ago
- Ferramenta de Reconhecimento para Pentest☆46Updated 3 years ago
- A simple C program to demonstrate a Buffer Overflow.☆11Updated 3 years ago
- FleakOS Kernel Source Tree☆29Updated 5 months ago
- 『🔍』Simple Information finder using Google Dork☆34Updated 4 years ago
- Advanced Vulnerability Scanner Tool☆69Updated 9 months ago
- Painel de consulta☆40Updated 3 years ago
- Versão PT-BR do hacktricks.☆47Updated 4 months ago
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆26Updated last year
- a cpp wrapper for ngrok☆8Updated 3 years ago
- Robson is a simple LKM rootkit that uses the Linux kernel's kprobes tracing feature as a hooking mechanism.☆12Updated 2 years ago
- 😛 Primefaces 5.X EL Injection Exploit (CVE-2017-1000486)☆18Updated last year
- Rubidea - Bind XSS Server to Steal cookies.☆11Updated 4 years ago
- Repositório criado com intuito de reunir templates da ferramenta Nuclei dentro do contexto Brasil☆74Updated 2 years ago
- ⭐ Physics class project☆35Updated 2 years ago
- A simple script to automate systemd backdoor☆23Updated 2 years ago
- Ransomware hello kitty☆23Updated 4 years ago
- pugrecon is a bash script for automatic recon of common vulnerabilities, misconfigurations and files on domains.☆23Updated 4 years ago
- An full HTTP server for Phishing. Downloads recursively the entire webpage.☆134Updated 4 years ago
- Simple multi client Backdoor, with Python.☆11Updated 2 years ago
- ☆17Updated last year
- 🔍 Improve your files enumeration with specific extensions!☆17Updated 3 years ago
- The LKM rootkit working in Linux Kernels 2.6.x/3.x/4.x/5.x☆128Updated last year
- A customized mixed PT-BR wordlist for pentesting purposes.☆13Updated 5 years ago