ShadowEye / envisioncollisionLinks
Getting Envisioncollision to actually work.
☆15Updated 8 years ago
Alternatives and similar repositories for envisioncollision
Users that are interested in envisioncollision are comparing it to the libraries listed below
Sorting:
- Windows/Linux - ReverseShellBackdoor Framework☆50Updated 6 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 10 years ago
- Automated Cyber Offense☆88Updated 6 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22Updated 10 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Updated 7 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 9 years ago
- shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION☆41Updated 8 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆44Updated 6 years ago
- Utilize Pastebin's scraping API to find interesting pastes.☆16Updated 6 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Updated 13 years ago
- Scripts and tools for ISM hacking☆16Updated 7 years ago
- Dependencies for Veil 3☆17Updated 8 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 12 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Updated 9 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Updated 8 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.☆23Updated 8 years ago
- log file scrubber☆15Updated 7 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- 完整版:the purported Equation Group(NSA下属) hack by the Shadow Brokers(影子经纪人)--234MB☆18Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Updated 10 years ago
- Twitter as an extra entropy source☆104Updated 7 years ago
- A search tool that searches Offensive Securitys Exploit-db and Shodans Exploit DB using their API.☆40Updated 11 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 7 years ago
- A ctypes powered python keylogger.☆107Updated 6 years ago
- lulz: automated webstalking tool☆54Updated 9 years ago
- Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.☆32Updated 6 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- A fast and advanced ransomware PoC☆60Updated 10 years ago