Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.
☆22Jul 5, 2016Updated 9 years ago
Alternatives and similar repositories for Bot_Army
Users that are interested in Bot_Army are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Notes to the book☆20Oct 29, 2015Updated 10 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆30Sep 28, 2015Updated 10 years ago
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- Stagefright Android exploit☆19Aug 11, 2022Updated 3 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 3 months ago
- A python based https remote access trojan for penetration testing☆84Jan 7, 2016Updated 10 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆15Sep 9, 2012Updated 13 years ago
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- Open source exploit framework made in C#☆54Jan 27, 2025Updated last year
- Automating and Enhancing Nmap using Python☆17Apr 18, 2018Updated 8 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Oct 10, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Perl/Python modules for interfacing with Metasploit MSGRPC☆97Aug 7, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/ioctlbf☆17Mar 28, 2015Updated 11 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 10 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆83Jul 2, 2018Updated 7 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 11 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- automatic scan for hackthebox☆13Jan 14, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Sep 17, 2015Updated 10 years ago
- Templating with sinister modules☆16Jun 20, 2023Updated 2 years ago
- Docker Automated Build for Security Testing Tools☆14Apr 8, 2022Updated 4 years ago
- ftpknocker is a multi-threaded scanner for finding anonymous FTP servers☆41Jul 20, 2025Updated 9 months ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Apr 20, 2015Updated 11 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- A PowerShell script anti-virus evasion tool☆18Jan 3, 2021Updated 5 years ago
- Modules created by Nettitude for Metasploit☆11Jun 20, 2018Updated 7 years ago
- Unsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest☆227Aug 28, 2024Updated last year
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 9 years ago
- Plugins and signatures☆13Jun 11, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆13Oct 4, 2015Updated 10 years ago