Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.
☆22Jul 5, 2016Updated 9 years ago
Alternatives and similar repositories for Bot_Army
Users that are interested in Bot_Army are comparing it to the libraries listed below
Sorting:
- Injector能夠在iOS介面上瀏覽網路封包、網路使用狀態、區域網路主機訊息、系統工具、網路工具指令、防火牆...等功能。 Injector function: browse network packet, network usage, LAN host configur…☆22Oct 9, 2016Updated 9 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Sep 28, 2015Updated 10 years ago
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- Stagefright Android exploit☆18Aug 11, 2022Updated 3 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 2 months ago
- A python based https remote access trojan for penetration testing☆84Jan 7, 2016Updated 10 years ago
- Compilation of ready to run exploits, advisories, tools and online key generators for embedded devices.☆139Mar 13, 2016Updated 10 years ago
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- Open source exploit framework made in C#☆54Jan 27, 2025Updated last year
- Automating and Enhancing Nmap using Python☆17Apr 18, 2018Updated 7 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Oct 10, 2018Updated 7 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Automatically exported from code.google.com/p/ioctlbf☆17Mar 28, 2015Updated 10 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 11 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Jul 2, 2018Updated 7 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- automatic scan for hackthebox☆13Jan 14, 2020Updated 6 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Sep 17, 2015Updated 10 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- Docker Automated Build for Security Testing Tools☆14Apr 8, 2022Updated 3 years ago
- ftpknocker is a multi-threaded scanner for finding anonymous FTP servers☆41Jul 20, 2025Updated 7 months ago
- Automatically exported from code.google.com/p/windbgshark☆12Nov 3, 2015Updated 10 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Port scanning and domain utility.☆30Sep 8, 2017Updated 8 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- A PowerShell script anti-virus evasion tool☆18Jan 3, 2021Updated 5 years ago
- Modules created by Nettitude for Metasploit☆12Jun 20, 2018Updated 7 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago