analyze a web-based network traffic πΆ to detect central command and control servers
β80Jun 30, 2018Updated 7 years ago
Alternatives and similar repositories for squidmagic
Users that are interested in squidmagic are comparing it to the libraries listed below
Sorting:
- A client/server style agent meant for testing connectivity to and from a machine on a network.β20Aug 17, 2017Updated 8 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :Vβ17Nov 29, 2019Updated 6 years ago
- Script to generate malicious debian packages (debain trojans).β121Apr 24, 2019Updated 6 years ago
- Opinionated organisation-centric OSINT footprinting inspired from recon-ng and Maltegoβ178Jul 29, 2017Updated 8 years ago
- It's a tool to manage vulnerables packages in your *nix server, in a centralized wayβ30Dec 15, 2020Updated 5 years ago
- A payload stager using PowerShellβ183Dec 15, 2019Updated 6 years ago
- minimal script to help find script into the nse databaseβ133Jul 10, 2018Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Toolβ26Jun 8, 2017Updated 8 years ago
- Analyse SQL injection attempts in web server logsβ82Jan 11, 2017Updated 9 years ago
- Archive Mirror for recently republished PoC/Exploit codeβ17Nov 26, 2017Updated 8 years ago
- Protect your parents from phishingβ40Dec 4, 2017Updated 8 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.β59Apr 3, 2017Updated 8 years ago
- Command line tool for scanning streams within office documents plus xor db attackβ127Sep 23, 2023Updated 2 years ago
- This tool extract domains from IP address based in the information saved in virustotal.β24Jan 11, 2017Updated 9 years ago
- An anti-ARP-spoofing application software that use active and passive scanning methods to detect and remove any ARP-spoofer from the netwβ¦β177Sep 2, 2020Updated 5 years ago
- PowerShell Empire module for logging USB keystrokes via ETWβ32Nov 11, 2016Updated 9 years ago
- Fucking Search Engines Scraper - python library to scrap url's from search enginesβ49Sep 6, 2017Updated 8 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewallβ83Oct 24, 2019Updated 6 years ago
- WEB SERVICE SECURITY ASSESSMENT TOOLβ390Sep 24, 2021Updated 4 years ago
- Ayaabu is a funny trick that fake the installation of many Antivirusβ12Jul 6, 2016Updated 9 years ago
- A collection of scripts made duing my personal researchβ29Sep 27, 2018Updated 7 years ago
- Intelligent threat hunter and phishing serversβ47Jan 20, 2019Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting β¦β88May 8, 2018Updated 7 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any mβ¦β307Oct 27, 2017Updated 8 years ago
- A Python RESTful API framework for online malware analysis and threat intelligence services.β368May 21, 2024Updated last year
- β424Aug 29, 2017Updated 8 years ago
- The Hacker's ToolBoxβ191Jun 29, 2017Updated 8 years ago
- Credential Phish Analysis and Automationβ99Aug 22, 2018Updated 7 years ago
- Simple script to automate brutforcing blind sql injection vulnerabilitiesβ50Jul 16, 2017Updated 8 years ago
- A smart gateway to stop cyber criminals - Sponsored by Falcon Guardβ255Dec 12, 2022Updated 3 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.β601Jul 18, 2021Updated 4 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.β72Dec 18, 2019Updated 6 years ago
- Inforfinder is a tool to collect information of any domains pointing at some server (ip, domain, range, file). Is able to detect all domaβ¦β68Sep 18, 2024Updated last year
- Tool to automatic leak information using Hacking with engine searchesβ93May 9, 2018Updated 7 years ago
- OSINT Threat Intel Interface - CLI for HoneyDBβ118Feb 12, 2019Updated 7 years ago
- DHCP option injectorβ42Jul 7, 2020Updated 5 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.β153Oct 20, 2018Updated 7 years ago
- Usefull snippets / Computer-security orientedβ20Apr 20, 2017Updated 8 years ago
- Powershell Empire Persistence finderβ119Jan 30, 2017Updated 9 years ago