Souhardya / WarChildLinks
War Child denial of service testing suite
☆123Updated 8 years ago
Alternatives and similar repositories for WarChild
Users that are interested in WarChild are comparing it to the libraries listed below
Sorting:
- A script written lazily for generating cross-platform backdoors on the go :)☆190Updated 7 years ago
- The Hacker's ToolBox☆189Updated 8 years ago
- CookieCatcher☆145Updated 12 years ago
- Mass exploitation tool in python☆205Updated 6 years ago
- Advanced Hash Manipulation☆176Updated 6 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 4 years ago
- My collection of metasploit auxiliary post-modules☆193Updated 6 years ago
- Avoidz tool to bypass most A.V softwares☆139Updated 8 years ago
- Search for information related to domain: Emails - IP addresses - Sub-Domains - Information on WEB technology - Type of Firewall - NS and…☆116Updated 5 years ago
- Terminator metasploit payload generator☆180Updated 7 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆75Updated 8 years ago
- Phishing on Twitter☆255Updated 7 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆122Updated 7 years ago
- A simple bash based metasploit automation tool!☆124Updated 2 years ago
- metasploitHelper☆251Updated 5 years ago
- A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently.☆126Updated 2 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated 2 years ago
- [unmaintained] Post-exploitation tool☆183Updated 9 years ago
- A web interface to automate Scanning, Generating metasploit payload, Network Testing,Exploring CMS,Information Gathering and much more☆169Updated 10 years ago
- TOOL - Unauthenticated Remote DNS , Scanner ranger IP.☆89Updated 9 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 8 years ago
- Passive Vulnerability Auditor☆135Updated 9 years ago
- Chat with hacker assistant☆196Updated 7 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆70Updated 5 years ago
- DDoS attacks via other sites execution tool (DAVOSET) - it is command line tool for conducting DDoS attacks on the sites via Abuse of Fun…☆127Updated 6 years ago
- A JBoss script for obtaining remote shell access☆176Updated 5 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 8 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆261Updated 8 years ago
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆257Updated 4 years ago
- 📡🔍Searches for wifi-pineapple traces and calculate wireless network security score 🍍☆159Updated 5 years ago