b3d3c / BDsploitLinks
BDsploit (Big Data Exploitation and Post-exploitation Toolkit)
☆5Updated last year
Alternatives and similar repositories for BDsploit
Users that are interested in BDsploit are comparing it to the libraries listed below
Sorting:
- Command line tool that allows you to explore IoT devices by using Shodan API.☆25Updated 4 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Collections of way to evade normal detection events.☆25Updated 4 years ago
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆15Updated 3 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 5 years ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆27Updated 5 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆21Updated 11 years ago
- Pentest ToolKit☆28Updated 5 years ago
- Collection of cracked malware☆14Updated 6 years ago
- A java based google hacking tool that allows to do advanced search on google, also to search in google hacking database and exploit datab…☆23Updated 8 years ago
- Automate the creation of Backdoors and postexplotation activities