Trackbool / DerpNSpoof
Simple DNS Spoofing tool made in Python 3 with Scapy
☆75Updated 5 years ago
Alternatives and similar repositories for DerpNSpoof:
Users that are interested in DerpNSpoof are comparing it to the libraries listed below
- A Phishing Dropper designed to Pentest.☆270Updated 7 years ago
- Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Scrip…☆157Updated 9 months ago
- DNS spoofer. Drops DNS responses from the router and replaces it with the spoofed DNS response☆282Updated 7 years ago
- A simple script to generate a hidden url for social engineering.☆123Updated 4 years ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆122Updated last year
- some python3 functions to add spreading features to any python backdoor☆51Updated 8 years ago
- An automated Wireless RogueAP MITM attack framework.☆181Updated 5 years ago
- Programmed For Penetration Testing Beginners . This Program Based on Mdk3 . "WiFi Stress Testing Beacon Flooding & Deauthentication Attac…☆85Updated 6 years ago
- Python based Remote Administration Tool(RAT)☆93Updated 4 years ago
- NXcrypt - 'python backdoor' framework☆365Updated 7 years ago
- WinSpy a Windows reverse shell Backdoor creator with an Automatic IP Poisener☆203Updated 6 years ago
- PowerFull Administration Tool For Linux☆139Updated 7 years ago
- ☆35Updated 5 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 4 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 3 years ago
- Userspace remote keylogger for Linux, works with X, logs key stikes to a file and sends report by email.☆140Updated 9 months ago
- SMS Phishing Tools☆78Updated 7 years ago
- Multiplatform payload dropper☆264Updated 3 years ago
- Ransomware builder☆85Updated 4 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆83Updated 4 years ago
- It is a tool that brings together exploits and news about security and vulnerabilities, with the intention of contributing to the open so…☆59Updated 6 years ago
- Demonstration of Google Chrome Passwords theft☆10Updated 6 years ago
- Control remote computers using discord bot and python 3.☆177Updated 2 years ago
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆127Updated 4 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆25Updated 8 years ago
- Automatically exported from code.google.com/p/ghost-phisher☆353Updated 4 years ago
- Simple implementation of a distributed SSH system, or botnet. Add bots to the botnet with IP address, host username, and host password. I…☆89Updated 4 years ago
- Automated rogue access point setup tool.☆192Updated 3 years ago
- Git all your favorite tools in one click☆262Updated 2 years ago
- This is Jester ransomware like, in Mr Robot movie (coded by Darlene S1E2,3), Please beware warning, after start you can't recover the fil…☆363Updated 4 years ago