cr0mll / deserterLinks
A targeted DNS cache poisoner
☆123Updated 3 years ago
Alternatives and similar repositories for deserter
Users that are interested in deserter are comparing it to the libraries listed below
Sorting:
- ☆233Updated 3 years ago
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 4 years ago
- Hunting for passwords with deep learning☆226Updated last year
- Simple & Customizable DNS Data Exfiltrator☆112Updated 2 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆175Updated 5 months ago
- LD_PRELOAD rootkit☆136Updated last year
- https://github.com/BC-SECURITY/Empire☆49Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated 11 months ago
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆214Updated 5 months ago
- 0xpat blog☆104Updated 3 years ago
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆264Updated last year
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆268Updated 2 years ago
- A WLAN red team framework.☆154Updated last year
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- My new C2 framework☆40Updated 2 years ago
- Wordlist to crack .zip-file password☆205Updated 3 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆30Updated 3 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- A proof of concept email spoofing tool built on Docker.☆128Updated 4 years ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆102Updated 5 months ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 3 years ago
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆55Updated 2 years ago
- Python Obfuscator to generate One-Liners and FUD Payloads.☆164Updated 4 years ago
- An AV exclusion enumeration tool written in Python.☆59Updated 3 years ago
- Gather information from an email address connected to Office 365☆85Updated 2 years ago
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆67Updated 4 years ago
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆442Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆181Updated last year
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago