Souhardya / WarChildLinks
War Child denial of service testing suite
☆121Updated 8 years ago
Alternatives and similar repositories for WarChild
Users that are interested in WarChild are comparing it to the libraries listed below
Sorting:
- Generate Payloads and Control Remote Machines. [Discontinued]☆224Updated 4 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆191Updated 7 years ago
- The Hacker's ToolBox☆190Updated 8 years ago
- Mass exploitation tool in python☆205Updated 7 years ago
- Terminator metasploit payload generator☆180Updated 7 years ago
- CookieCatcher☆145Updated 12 years ago
- Advanced Hash Manipulation☆176Updated 6 years ago
- Avoidz tool to bypass most A.V softwares☆139Updated 8 years ago
- [unmaintained] Post-exploitation tool☆182Updated 9 years ago
- A simple bash based metasploit automation tool!☆124Updated 2 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆75Updated 9 years ago
- A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently.☆127Updated 2 years ago
- My collection of metasploit auxiliary post-modules☆192Updated 6 years ago
- Red Login: SSH Brute-force Tools☆106Updated 7 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆123Updated 7 years ago
- Search for information related to domain: Emails - IP addresses - Sub-Domains - Information on WEB technology - Type of Firewall - NS and…☆116Updated 5 years ago
- metasploitHelper☆251Updated 5 years ago
- Phishing on Twitter☆253Updated 7 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134Updated 6 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆70Updated 5 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 8 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆438Updated 8 years ago
- DDoS attacks via other sites execution tool (DAVOSET) - it is command line tool for conducting DDoS attacks on the sites via Abuse of Fun…☆127Updated 6 years ago
- 📡🔍Searches for wifi-pineapple traces and calculate wireless network security score 🍍☆159Updated 5 years ago
- TOOL - Unauthenticated Remote DNS , Scanner ranger IP.☆89Updated 10 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆85Updated 11 years ago
- An automatic SQL Injection tool which takes advantage of ~DorkNet~ Googler, Ddgr, WhatWaf and sqlmap.☆272Updated 4 years ago
- A web interface to automate Scanning, Generating metasploit payload, Network Testing,Exploring CMS,Information Gathering and much more☆169Updated 10 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆261Updated 8 years ago
- Inject malicious code into *.debs☆278Updated 3 years ago