Souhardya / WarChildLinks
War Child denial of service testing suite
☆123Updated 8 years ago
Alternatives and similar repositories for WarChild
Users that are interested in WarChild are comparing it to the libraries listed below
Sorting:
- The Hacker's ToolBox☆188Updated 8 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Updated 6 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆222Updated 4 years ago
- Advanced Hash Manipulation☆177Updated 5 years ago
- Terminator metasploit payload generator☆181Updated 7 years ago
- CookieCatcher☆144Updated 12 years ago
- Avoidz tool to bypass most A.V softwares☆139Updated 7 years ago
- My collection of metasploit auxiliary post-modules☆192Updated 6 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆333Updated last year
- Mass exploitation tool in python☆205Updated 6 years ago
- Red Login: SSH Brute-force Tools☆105Updated 7 years ago
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆256Updated 4 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆75Updated 8 years ago
- A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently.☆125Updated 2 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆73Updated 5 years ago
- metasploitHelper☆250Updated 5 years ago
- DDoS attacks via other sites execution tool (DAVOSET) - it is command line tool for conducting DDoS attacks on the sites via Abuse of Fun…☆127Updated 6 years ago
- Tulpar - Web Vulnerability Scanner☆203Updated 5 years ago
- Inject malicious code into *.debs☆278Updated 3 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆123Updated 7 years ago
- A simple bash based metasploit automation tool!☆125Updated 2 years ago
- Social Engineering Tool☆190Updated 7 years ago
- Phishing on Twitter☆256Updated 7 years ago
- 📡🔍Searches for wifi-pineapple traces and calculate wireless network security score 🍍☆158Updated 5 years ago
- [unmaintained] Post-exploitation tool☆183Updated 9 years ago
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆372Updated 8 years ago
- Python clone of arpspoof that can poison hosts via arp-requests as well as arp-replies☆194Updated 6 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75Updated 7 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated 2 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆441Updated 8 years ago