Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.
☆22Jul 5, 2016Updated 9 years ago
Alternatives and similar repositories for Bot_Army
Users that are interested in Bot_Army are comparing it to the libraries listed below
Sorting:
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 10 years ago
- A python based https remote access trojan for penetration testing☆84Jan 7, 2016Updated 10 years ago
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- Port scanning and domain utility.☆29Sep 8, 2017Updated 8 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated last month
- GTA V Map☆18Mar 24, 2023Updated 2 years ago
- Wardriving ekoparty☆15Oct 9, 2017Updated 8 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆13Aug 9, 2020Updated 5 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Sep 9, 2012Updated 13 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Sep 28, 2015Updated 10 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Docker Automated Build for Security Testing Tools☆14Apr 8, 2022Updated 3 years ago
- ☆12Jan 11, 2020Updated 6 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- An Chat Program for use with the ToorCon 2013 badge.☆20Oct 21, 2012Updated 13 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- Hack In Paris 2018 Slideware☆18Jul 2, 2018Updated 7 years ago
- automatic scan for hackthebox☆13Jan 14, 2020Updated 6 years ago
- Automating and Enhancing Nmap using Python☆17Apr 18, 2018Updated 7 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 8 years ago
- repo with compromised keys and such☆23Dec 29, 2022Updated 3 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- AD-control-paths LDAP submodule☆19Jun 20, 2018Updated 7 years ago
- Templating with sinister modules☆16Jun 20, 2023Updated 2 years ago
- Academic project implementing basic first-hop LAN attacks such as DHCP starvation, ARP spoofing, DNS poisoning and more.☆18May 14, 2020Updated 5 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆22Jun 3, 2014Updated 11 years ago
- A PowerShell script anti-virus evasion tool☆18Jan 3, 2021Updated 5 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 10 years ago