abdulfatir / ZipBomb
A simple implementation of ZipBomb in Python
☆325Updated 9 months ago
Related projects: ⓘ
- ☆510Updated this week
- Remote administration service which uses twitter as a command and control server☆708Updated 3 years ago
- powerful auto-backdooring utility☆739Updated 6 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆319Updated 4 years ago
- PenBox - A Penetration Testing Framework - The Tool With All The Tools , The Hacker's Repo☆463Updated 7 years ago
- About an old technology that still screws up some anti virus software☆136Updated 8 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,655Updated 4 years ago
- Inject code and spy on wifi users☆2,578Updated 3 years ago
- Python logger with multiple features.☆525Updated 3 years ago
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malic…☆505Updated 7 years ago
- The hackers tool belt☆510Updated 6 years ago
- ☆986Updated this week
- DNS spoofer. Drops DNS responses from the router and replaces it with the spoofed DNS response☆273Updated 7 years ago
- ☆901Updated this week
- A steganographic program that encodes files in pictures☆106Updated 5 years ago
- A simple, fully python ransomware PoC☆369Updated 4 years ago
- A Simple Multi-Threaded SSH Brute Forcer☆267Updated 4 years ago
- An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.☆414Updated 6 years ago
- Bull's Eye Wordlist Generator - Does your password rely on predictable patterns of accessible info?☆403Updated 3 years ago
- Xenotix Python Keylogger for Windows.☆458Updated 5 years ago
- Cloak can backdoor any python script with some tricks.☆481Updated 5 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,147Updated 6 years ago
- Chat with hacker assistant☆191Updated 6 years ago
- NXcrypt - 'python backdoor' framework☆363Updated 7 years ago
- A malicious captive wifi portal☆139Updated 4 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆435Updated 7 years ago
- Know the dangers of credential reuse attacks.☆2,004Updated 5 years ago
- Script for encrypting a GNU/Linux filesystem and then destroying the keys☆6Updated 6 years ago
- The Credential Mapper☆433Updated 6 years ago
- Kick devices off your network by performing an ARP Spoof attack with Node.js.☆282Updated last year