ShadowEye / envisioncollisionLinks
Getting Envisioncollision to actually work.
☆15Updated 8 years ago
Alternatives and similar repositories for envisioncollision
Users that are interested in envisioncollision are comparing it to the libraries listed below
Sorting:
- Automated Cyber Offense☆88Updated 6 years ago
- Twitter as an extra entropy source☆104Updated 7 years ago
- shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION☆41Updated 8 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 8 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Updated 7 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22Updated 10 years ago
- Man-in-the-middle against Tor bridges☆28Updated 6 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Updated 10 years ago
- HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.☆24Updated 8 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆50Updated 6 years ago
- log file scrubber☆15Updated 7 years ago
- Simple security surveillance script for linux distributions.☆59Updated 9 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆37Updated 12 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 12 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 9 years ago
- A small TOR Onion Address harvester for checking if the address is available or not.☆78Updated 7 years ago
- ☆21Updated 9 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆13Updated 8 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 10 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Updated 8 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- This is the linux version of the R.A.T client written in c#☆10Updated 8 years ago
- A tool for fuzzing for ports that allow outgoing connections☆17Updated 7 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Updated 9 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆53Updated 8 years ago
- A copy of articles published at Peerlyst☆43Updated 9 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Updated 9 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆48Updated 9 years ago
- Open-source Exploiting Framework☆31Updated 8 years ago
- Multi source CVE/exploit parser.☆27Updated 8 years ago