Automate the creation of Backdoors and postexplotation activities
☆23Jun 20, 2022Updated 3 years ago
Alternatives and similar repositories for KAOSK-backdoors
Users that are interested in KAOSK-backdoors are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆31Jun 19, 2022Updated 3 years ago
- SPG: Simple MSFVenom Payload Generator☆24Jul 10, 2019Updated 6 years ago
- Brutteforce for stego CTFs☆16Nov 2, 2022Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆21Jun 20, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Selenium based bot that automatize the creation of accounts in a web page☆16Nov 2, 2022Updated 3 years ago
- Simple script to download some missing tools in Kali☆33Nov 28, 2020Updated 5 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆16Sep 21, 2020Updated 5 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Feb 11, 2021Updated 5 years ago
- Windows Malware Probe of Concept☆21Jun 20, 2022Updated 3 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Nov 18, 2018Updated 7 years ago
- Windows privilege escalation with cmd☆91Dec 13, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- List of all pastebin.com analogs I know of. They are useful for finding leaked personal data☆22Jul 18, 2021Updated 4 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- ☆26Jun 19, 2022Updated 3 years ago
- AD-control-paths LDAP submodule☆19Jun 20, 2018Updated 7 years ago
- Tool of the buttons for quick search keywords ans hashtags in 70 different social media platforms☆46Sep 7, 2023Updated 2 years ago
- Try to bruteforce several cypher algorithms that can be used in CTFs☆13Jun 20, 2022Updated 3 years ago
- Try various exploits to get root☆19Nov 14, 2013Updated 12 years ago
- ☆15Jan 24, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 8 years ago
- NSA tool hacking☆15May 20, 2018Updated 7 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- System based on +500 blacklists to detect internet potencialy malicious hosts☆154Mar 20, 2026Updated last week
- Networkscanner written in rust☆10May 29, 2020Updated 5 years ago
- Teaching old shellcode new tricks☆209Aug 1, 2017Updated 8 years ago
- ☆29Mar 2, 2023Updated 3 years ago
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago
- Blog posts for https://openliberty.io☆11Updated this week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Serving files with conditions, serverside keying and more.☆18May 26, 2022Updated 3 years ago
- Twitter Words of Interest - Generate word lists from twitter searches☆31Nov 10, 2022Updated 3 years ago
- WhatsApp Web phishing page for authorized pentesting. Captures international phone numbers + OTP codes with pixel-perfect 2026 UI. Real-t…☆39Mar 6, 2026Updated 3 weeks ago
- pen testing scripts☆12Feb 7, 2021Updated 5 years ago
- visually see issues with supported cipher suites☆18Jun 18, 2024Updated last year
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆21Oct 27, 2023Updated 2 years ago
- Command line text processing with Rust tools☆20May 14, 2022Updated 3 years ago