airencracken / eviltoolsLinks
A collection of malicious tools I wrote when playing black team for an invitational CCDC competition
☆23Updated 10 years ago
Alternatives and similar repositories for eviltools
Users that are interested in eviltools are comparing it to the libraries listed below
Sorting:
- ☆17Updated 8 years ago
- A simple, yet highly customizable, script to use with cloned websites for phishing and credentials harvesting☆18Updated 3 years ago
- An ELF parasite command injector.☆34Updated 7 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago
- A collection of notes and script that will help you learn basics of hacking with Python☆34Updated 10 years ago
- Computer code for the Analysis of RF measurement data and generation of scenarios☆10Updated 7 years ago
- dbling: The Chrome OS Forensic Toolset☆13Updated 4 years ago
- This is a fuzzer for automated web application scanners and vulnerability scanners. The idea is to send an unexpectedly large response to…☆24Updated 9 years ago
- Network based steganography based control channels and chat.☆8Updated 9 years ago
- Checklist and tools for increasing security of Apache Airflow☆32Updated 4 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- Darkside Ransomware☆12Updated 4 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Using Ordered Markov Chains and User Information to Speed up Password Cracking☆27Updated 8 years ago
- Web based code browser using clang to provide basic code analysis.☆44Updated 7 years ago
- ☆12Updated 6 years ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Updated 9 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆42Updated 7 years ago
- Pynject - An automatic MySQL injector and data dumper tool.☆13Updated 14 years ago
- Universal guided editor and reverse engineering tool for binary data.☆11Updated 7 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- A monitoring program with sentiment analysis and prioritization.☆13Updated 6 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated 2 years ago
- Thanos is a tool made for scan a range of IP's and get the banners of the running services. The main function is do banner grabber, but y…☆44Updated 9 years ago
- Nmap results are a semigroup☆13Updated 4 years ago
- Performs a task over (a subset of) all Tor exit relays.☆8Updated 10 years ago
- Scrape real-time Dark Web data across Tor to your local kafka network☆14Updated 9 years ago