cr0mll / deserterLinks
A targeted DNS cache poisoner
☆121Updated 2 years ago
Alternatives and similar repositories for deserter
Users that are interested in deserter are comparing it to the libraries listed below
Sorting:
- ☆232Updated 2 years ago
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers☆120Updated 8 months ago
- Hunting for passwords with deep learning☆215Updated last year
- Wordlist to crack .zip-file password☆204Updated 2 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆168Updated 3 months ago
- A proof of concept email spoofing tool built on Docker.☆128Updated 3 years ago
- Repository and archive for Killing The Bear Gitbook☆83Updated last year
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆268Updated 2 years ago
- Simple & Customizable DNS Data Exfiltrator☆110Updated 2 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆258Updated last year
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆210Updated 2 months ago
- Crappy Golang code to list local listening ports and their associated processes.☆32Updated 2 years ago
- My new C2 framework☆40Updated 2 years ago
- Spoof emails from any of the +2 Million domains using MailChannels (DEFCON 31 Talk)☆338Updated last year
- A PoC ransomware sample to test out your ransomware response strategy.☆211Updated 3 months ago
- LD_PRELOAD rootkit☆133Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆52Updated 2 years ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆121Updated 6 months ago
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆46Updated 2 years ago
- Discord C2 for Redteam....Need a better name☆133Updated 2 years ago
- OSINT tool for discovering the real IP addresses of services which are behind Cloudflare but not properly locked down☆144Updated last year
- Gather information from an email address connected to Office 365☆85Updated 2 years ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆130Updated 8 months ago
- Python Obfuscator to generate One-Liners and FUD Payloads.☆163Updated 4 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆109Updated last year
- 🍳 The most delicious pentesting tool☆45Updated 3 years ago