cr0mll / deserter
A targeted DNS cache poisoner
☆117Updated 2 years ago
Alternatives and similar repositories for deserter:
Users that are interested in deserter are comparing it to the libraries listed below
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 3 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆193Updated 3 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆110Updated last year
- 0xpat blog☆100Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers☆114Updated 3 months ago
- ☆64Updated 3 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆105Updated 2 months ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆260Updated 2 years ago
- Simple & Customizable DNS Data Exfiltrator☆107Updated last year
- ☆226Updated 2 years ago
- My new C2 framework☆40Updated 2 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆430Updated last year
- Modular personalized dictionary generator.☆199Updated 6 months ago
- X-Platform bind shell in TypeScript!☆28Updated last year
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆103Updated last year
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆67Updated 4 years ago
- Hunting for passwords with deep learning☆206Updated 9 months ago
- A polyglot payload generator☆239Updated 2 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆93Updated last year
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆56Updated last year
- Fast and intuitive manager for multiple reverse shells☆85Updated 2 months ago
- msImpersonate - User account impersonation written in pure Python3☆107Updated 2 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆169Updated this week
- Simple HTTP listener for security testing☆113Updated 2 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- Bash script to check for CVE-2022-0847 "Dirty Pipe"☆66Updated last year
- Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.☆258Updated 3 years ago
- collection of apis used in malware development☆223Updated 2 years ago
- Wordlists handcrafted (and automated) with ♥☆215Updated 10 months ago