cr0mll / deserterLinks
A targeted DNS cache poisoner
☆124Updated 3 years ago
Alternatives and similar repositories for deserter
Users that are interested in deserter are comparing it to the libraries listed below
Sorting:
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 4 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆175Updated 7 months ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- Repository and archive for Killing The Bear Gitbook☆84Updated 2 years ago
- Crappy Golang code to list local listening ports and their associated processes.☆32Updated 2 years ago
- ☆233Updated 3 years ago
- A proof of concept email spoofing tool built on Docker.☆129Updated 4 years ago
- Hunting for passwords with deep learning☆231Updated last year
- Windows File Integrity -- an archive of information on installed Windows binaries.☆32Updated 3 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 3 years ago
- 🍳 The most delicious pentesting tool☆46Updated 4 years ago
- A WLAN red team framework.☆155Updated last year
- LD_PRELOAD rootkit☆138Updated last year
- Simple & Customizable DNS Data Exfiltrator☆112Updated 2 years ago
- My new C2 framework☆40Updated 3 years ago
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆217Updated 6 months ago
- Wordlist to crack .zip-file password☆206Updated 3 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆182Updated last year
- Fast and intuitive manager for multiple reverse shells☆86Updated 11 months ago
- A silly PAM module to allow authentication as any user with a single password.☆62Updated 5 years ago
- Linux Persistence Toolkit☆70Updated 3 years ago
- https://github.com/BC-SECURITY/Empire☆49Updated 2 years ago
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆67Updated 4 years ago
- Fork from @rsmudge/armitage☆137Updated 2 years ago
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆57Updated 3 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆135Updated last year
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆268Updated 2 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆58Updated 6 months ago