cr0mll / deserterLinks
A targeted DNS cache poisoner
☆124Updated 3 years ago
Alternatives and similar repositories for deserter
Users that are interested in deserter are comparing it to the libraries listed below
Sorting:
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆178Updated 8 months ago
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 4 years ago
- CTF toolbox☆21Updated 2 years ago
- ☆239Updated 3 years ago
- A WLAN red team framework.☆154Updated last year
- A proof of concept email spoofing tool built on Docker.☆129Updated 4 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- Hunting for passwords with deep learning☆232Updated last year
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆60Updated 3 years ago
- Repository and archive for Killing The Bear Gitbook☆84Updated 2 years ago
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆221Updated 8 months ago
- Simple & Customizable DNS Data Exfiltrator☆113Updated 2 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 4 years ago
- LD_PRELOAD rootkit☆137Updated last year
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 2 years ago
- My new C2 framework☆40Updated 3 years ago
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆66Updated 4 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- https://github.com/BC-SECURITY/Empire☆49Updated 2 years ago
- Crappy Golang code to list local listening ports and their associated processes.☆32Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- Wordlist to crack .zip-file password☆207Updated 3 years ago
- 🍳 The most delicious pentesting tool☆45Updated 4 years ago
- Linux Persistence Toolkit☆73Updated 3 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆108Updated 2 years ago
- Rodan Exploitation Framework☆103Updated last month
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆136Updated last year
- 0xpat blog☆109Updated 4 years ago
- A silly PAM module to allow authentication as any user with a single password.☆62Updated 5 years ago
- My Password Cracking Methodology☆83Updated 2 years ago