Souhardya / WarChildLinks
War Child denial of service testing suite
☆123Updated 8 years ago
Alternatives and similar repositories for WarChild
Users that are interested in WarChild are comparing it to the libraries listed below
Sorting:
- Avoidz tool to bypass most A.V softwares☆138Updated 7 years ago
- My collection of metasploit auxiliary post-modules☆191Updated 6 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆187Updated 6 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 4 years ago
- Terminator metasploit payload generator☆179Updated 7 years ago
- Social Engineering Tool☆189Updated 6 years ago
- The Hacker's ToolBox☆188Updated 7 years ago
- Advanced Hash Manipulation☆178Updated 5 years ago
- Mass exploitation tool in python☆205Updated 6 years ago
- Inject malicious code into *.debs☆276Updated 3 years ago
- Git all your favorite tools in one click☆268Updated 3 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆122Updated 7 years ago
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆258Updated 4 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆331Updated 10 months ago
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆366Updated 8 years ago
- Easy way to brute-force web directory.☆153Updated 6 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆291Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 7 years ago
- search for hosts info with shodan☆230Updated 4 years ago
- Phishing on Twitter☆253Updated 7 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆125Updated 6 years ago
- Yet another one hard-hitting tool to run HTTP stress tests 🌌☆176Updated 4 years ago
- Red Login: SSH Brute-force Tools☆103Updated 6 years ago
- NXcrypt - 'python backdoor' framework☆366Updated 7 years ago
- Create a DDOS attack using SNMP servers☆44Updated 11 years ago
- Python framework for IT security tools☆268Updated 8 years ago
- Linux bash script automation for metasploit☆265Updated 5 years ago
- metasploitHelper☆249Updated 5 years ago
- 📡🔍Searches for wifi-pineapple traces and calculate wireless network security score 🍍☆157Updated 5 years ago
- Remote Administration Toolkit (or Trojan) for POSiX (Linux/Unix) system working as a Web Service☆170Updated 6 years ago