Souhardya / WarChildView external linksLinks
War Child denial of service testing suite
☆121May 11, 2017Updated 8 years ago
Alternatives and similar repositories for WarChild
Users that are interested in WarChild are comparing it to the libraries listed below
Sorting:
- A script written lazily for generating cross-platform backdoors on the go :)☆190Oct 16, 2018Updated 7 years ago
- Random stuff☆16Jun 28, 2018Updated 7 years ago
- Advanced Hash Manipulation☆175Oct 14, 2019Updated 6 years ago
- Yet another one hard-hitting tool to run HTTP stress tests 🌌☆173May 18, 2021Updated 4 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆48Mar 22, 2022Updated 3 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Apr 27, 2023Updated 2 years ago
- library and intepreter for penetration testing tools☆30Apr 10, 2016Updated 9 years ago
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- Inject malicious code into *.debs☆283Apr 26, 2022Updated 3 years ago
- Inforfinder is a tool to collect information of any domains pointing at some server (ip, domain, range, file). Is able to detect all doma…☆68Sep 18, 2024Updated last year
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Nov 24, 2021Updated 4 years ago
- Exploits and Security Tools Framework 2.0.1☆307Sep 18, 2022Updated 3 years ago
- Simple script to automate brutforcing blind sql injection vulnerabilities☆50Jul 16, 2017Updated 8 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- An anti-ARP-spoofing application software that use active and passive scanning methods to detect and remove any ARP-spoofer from the netw…☆174Sep 2, 2020Updated 5 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Jun 30, 2017Updated 8 years ago
- Tool to automatic leak information using Hacking with engine searches☆93May 9, 2018Updated 7 years ago
- minimal script to help find script into the nse database☆133Jul 10, 2018Updated 7 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆630Oct 16, 2018Updated 7 years ago
- A Phishing Dropper designed to Pentest.☆277May 15, 2017Updated 8 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,438Nov 3, 2018Updated 7 years ago
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆379Apr 13, 2017Updated 8 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆116Feb 12, 2019Updated 7 years ago
- NXcrypt - 'python backdoor' framework☆368Jun 26, 2017Updated 8 years ago
- A small Php package to fetch archive url snapshots from archive.org. Using it you can fetch complete list of snapshot urls of any year or…☆19Jun 20, 2021Updated 4 years ago
- An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.☆443Jan 31, 2018Updated 8 years ago
- Wireless mouse/keyboard attack with replay/transmit poc☆93Jul 10, 2016Updated 9 years ago
- A fast and powerfull dashboard (admin) finder☆240Nov 20, 2018Updated 7 years ago
- Opinionated organisation-centric OSINT footprinting inspired from recon-ng and Maltego☆175Jul 29, 2017Updated 8 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆328Jun 25, 2022Updated 3 years ago
- PowerShell Empire mod to post-exploit the World!☆137Oct 7, 2018Updated 7 years ago
- Plecost - Wordpress finger printer Tool☆347Mar 1, 2023Updated 2 years ago
- Tulpar - Web Vulnerability Scanner☆201Dec 8, 2019Updated 6 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- Auto Reaver - multiple access point attack using Reaver☆52Feb 1, 2017Updated 9 years ago
- Automated Linux evil maid attack☆435Dec 22, 2015Updated 10 years ago
- Tools for information gathering☆355May 20, 2024Updated last year
- ☆139Jul 13, 2017Updated 8 years ago