b3d3c / BDsploit
BDsploit (Big Data Exploitation and Post-exploitation Toolkit)
☆5Updated last year
Alternatives and similar repositories for BDsploit:
Users that are interested in BDsploit are comparing it to the libraries listed below
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆20Updated 10 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Updated 7 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆15Updated 4 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 4 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 3 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- SIP hacking tools and scripts☆22Updated 4 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- Automated Google dorking with custom search engines☆27Updated 4 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Updated 11 years ago
- Collection of cracked malware☆14Updated 6 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 7 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆29Updated 6 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 4 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- pentest toolbox☆28Updated 2 years ago
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Updated 4 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆17Updated 4 years ago
- Telnet-2 allows to connect via Tor and define a custom timeout☆10Updated 5 years ago
- Instantly search the web for hacked data. Check if you appear in any database leaks.☆15Updated 6 years ago
- A simple, yet highly customizable, script to use with cloned websites for phishing and credentials harvesting☆17Updated 3 years ago
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆14Updated 3 years ago
- A collection of personal ZAP scripts☆14Updated last year
- DPE - Default Password Enumeration☆34Updated 11 years ago
- Exploitdb website search module written in python to ease you task ... No local db for exploitdb is need ...It just uses google dorks an…☆12Updated 5 years ago