atmoner / UstealerLinks
Ubuntu stealer, steal ubuntu information in local pc
☆21Updated 5 years ago
Alternatives and similar repositories for Ustealer
Users that are interested in Ustealer are comparing it to the libraries listed below
Sorting:
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- Phoenix based exploit kit for educational purpose.☆17Updated 6 years ago
- ☆13Updated 7 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Download and Inject code into Google Chrome extensions☆13Updated 7 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- An advanced reverse shell written in Python3.☆21Updated 4 years ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆13Updated 3 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Updated 4 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆22Updated 8 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Note:- Run this Script in root user.☆16Updated 7 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- ☆19Updated 7 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆50Updated 8 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆19Updated 8 years ago
- Hash Generator & Cracker☆38Updated 5 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆41Updated 2 years ago
- Simple Karma Attack☆69Updated 4 years ago
- Sends some one a malicious payload through smtp and starts a listener with metasploit.☆35Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- pen testing scripts☆11Updated 4 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 10 months ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- bash script to enumerate vulnerabilities on specific year through Shodan API☆46Updated 6 years ago
- ☆17Updated 6 years ago
- HTTP botnet☆61Updated 8 years ago