byt3n33dl3 / thc-CDN
Offensive Samurai : Android Accesses remotely on CLI.
โ35Updated 6 months ago
Alternatives and similar repositories for thc-CDN:
Users that are interested in thc-CDN are comparing it to the libraries listed below
- ๐ฐ๐ช WannaCry ๐ฅ๐ฎ๐ป๐๐ผ๐บ๐๐ฎ๐ฟ๐ฒ. This malware spread by using a vulnerability Exploit Called "EternalBlue".โ46Updated 8 months ago
- Release Neo the Evil Ducky, A scripts into any Hardware or drive Devices.โ12Updated 6 months ago
- TFRv2 : Remote control Access, used as a Bypasser for Anti Virus (Software) and Penetrate a FLAGSHIP Such as Android, Windows, and MacOS.โ87Updated 6 months ago
- A Survival Knife (Fantastic) Force Attacks, Incorporating Teeth Cybertooth && John the Ripper, most Advanced Password and Logon Cracker.โ70Updated 2 months ago
- ๐ BotNet ( .NET ) Source Codesโ14Updated 8 months ago
- Backdoor for Rubella on Shell'sโ32Updated 8 months ago
- Teeth - smilodon cybertooth is a password decryption utilities for online services & offline hashes, fastest and most advanced password cโฆโ45Updated 6 months ago
- An Open source Pentesting Software for Mapping Injection points to Takeover.โ46Updated 3 months ago
- Enterprise level of Parallelization SSH (Concurrency), Logon Penetration Testing.โ23Updated 2 months ago
- Docker Payloads (Bypass) Data at the endpoint when running NestJS APK.โ17Updated 7 months ago
- Juggernaut show Attacks for MFA from Apple ID.โ25Updated 4 months ago
- Weaponizing Nim, with the elegance of modern logic programming language. Nim can do that!?โ13Updated 7 months ago
- Six Degrees of Enterprise Domain Adminโ23Updated 3 weeks ago
- Six Degrees of Domain Adminโ46Updated 4 months ago
- Hooking frequency Sessions, a bundle of customs firmware and intensity of RF.โ14Updated 6 months ago
- Prevent users from accessing online services. Distributed Denied of Service Attack server that cuts off targets or surrounding Infrastrucโฆโ11Updated 7 months ago
- Kerberos Attacks From Networks or Domain controller log Perspective through HMAC in exchanges.โ30Updated 7 months ago
- Seven Degrees of Domain Adminโ75Updated 3 months ago
- Automated Exploit scanners for public Camera, CCTV's, and Capture Devices.โ17Updated 4 months ago
- A Sharp Knife Data Collector for BloodHound and BlackMarlinExec.โ95Updated 6 months ago
- Kerberos Attacks. EXECTRINITY focuses on the acquisition of TGS. Specifically operating under Active Directory.โ43Updated 4 months ago
- P O I S O N I N Gโ19Updated 6 months ago
- Configurations and Deprecated payloads. Some useful scripts for Cobaltstrike.โ17Updated 6 months ago
- A swiss army Knife for Penetration testing Networks and Active Directory.โ38Updated 3 weeks ago
- Kerberos Attacks by cracking the system or router that provides a gateway for Active Directory.โ20Updated 8 months ago
- Rootkit and Kernel attack kit, ๐๐๐ฎ๐ฏ๐ฒ๐น๐น๐ฎ program Enables Cyber Attacks to gain access from Machines without being detected.โ11Updated 6 months ago
- Offshore the Maze Octopus for Remote Admin Access.โ24Updated 6 months ago
- (Cracking Authentication) Attacking a Services and attempts to exploit the MFA processes.โ19Updated 6 months ago
- The most advanced GUI Frontend RAT for MacOS and OSX distro using XPC's Exploitation.โ38Updated 4 months ago
- For radio frequency research severe damage to privacy or modify wireless devices.โ18Updated 4 months ago