abpolym / mr-robot
Imitating all commands in the Mr. Robot TV Series
☆79Updated 9 years ago
Alternatives and similar repositories for mr-robot:
Users that are interested in mr-robot are comparing it to the libraries listed below
- Prints the IPs on your local network that're sending the most packets☆148Updated 3 years ago
- A password cracker for Portable PHP password hashes☆65Updated 4 years ago
- Social Engineering Tool Oriented to facebook☆56Updated 7 years ago
- Passive Vulnerability Auditor☆130Updated 8 years ago
- Proof-of-concept python IRC botnet for orchestrating macOS computers (harmless due to SIP & Gatekeeper)☆83Updated 3 years ago
- Simple security surveillance script for linux distributions.☆58Updated 8 years ago
- php-cli vulnerability scanner☆79Updated 9 years ago
- Powershell Reverse Rubber Ducky☆55Updated 9 years ago
- ARP spoof then session jack within your browser☆29Updated 10 years ago
- cewl wordlist generator from https://digi.ninja/projects/cewl.php☆29Updated 9 years ago
- A set of Python scripts for generating, parsing, sorting, and saving wordlists.☆50Updated 3 years ago
- Orb is a massive footprinting tool.☆45Updated 5 years ago
- Simple brute forcing in Python.☆103Updated last year
- Get detailed information about a Twitter user activity☆101Updated 9 years ago
- ArchAssault PKGBUILDs☆44Updated 9 years ago
- A ctypes powered python keylogger.☆104Updated 5 years ago
- Python code to extract chrome cookie, history and login data files☆58Updated 7 years ago
- A simple tool to dump users in popular forums and CMS :)☆29Updated 7 years ago
- A Cross-Platform Forensic Framework for Google Chrome☆69Updated 9 years ago
- Removed according to regulations☆35Updated 7 years ago
- Massive arsenal of hacker tools...☆77Updated 7 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- Hash cracker☆58Updated 6 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆60Updated 9 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- PoC Android smart phone botnet☆77Updated 12 years ago
- Transparently Routing Traffic Through Tor☆62Updated 3 months ago
- Use Tor for anonymous scanning with nmap☆79Updated 9 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 10 years ago
- Small backdoor using cookie.☆59Updated 8 years ago