adamziaja / python
my simple python scripts
☆25Updated 6 years ago
Alternatives and similar repositories for python:
Users that are interested in python are comparing it to the libraries listed below
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆167Updated 10 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 10 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- USB Attack to Decrypt Wi-Fi Communications☆32Updated 9 years ago
- AutoBrowser Screenshot☆48Updated 8 years ago
- WPS scan and pwn tool☆67Updated 5 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- Advanced Controller/Server/Client Reverse Shell/Bot – Windows/Linux – Python☆68Updated 9 years ago
- everything that does not fit elsewhere☆12Updated 7 years ago
- Multi-mode wireless LAN Based on a Software Access point for Kali Linux.☆50Updated 6 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆103Updated 8 years ago
- Veil Catapult is no longer supported☆76Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆50Updated 7 years ago
- Bash script to install Honeypot projects ona Raspbian System☆27Updated 9 years ago
- Exfiltrate files over dns requests using Python and/or Bash☆46Updated 9 years ago
- A python based https remote access trojan for penetration testing☆85Updated 9 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- Tools for 802.11 information gathering.☆119Updated 2 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Updated 9 years ago
- TCP session interception and injection framework☆56Updated 13 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- Phishing attack w/HTML5 offline cache framework based on Squid proxy☆30Updated 13 years ago
- Mailing Phishing Framework - This Branch is UNSTABLE :: Official STABLE master branch at https://github.com/Section9Labs/Cartero☆48Updated 7 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Updated 6 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago