cr0mll / deserter
A targeted DNS cache poisoner
☆118Updated 2 years ago
Alternatives and similar repositories for deserter:
Users that are interested in deserter are comparing it to the libraries listed below
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 3 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆265Updated 2 years ago
- ☆229Updated 2 years ago
- Simple & Customizable DNS Data Exfiltrator☆109Updated last year
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆177Updated 2 weeks ago
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆256Updated 11 months ago
- A prototype malware C2 channel using x509 certificates over mTLS☆153Updated last year
- Roast in the Middle☆292Updated 5 months ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- msImpersonate - User account impersonation written in pure Python3☆107Updated 2 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆195Updated 3 years ago
- Venom is a library that meant to perform evasive communication using stolen browser socket☆379Updated last year
- Malware vulnerability intel tool for third-party attackers☆116Updated 5 months ago
- Fast and intuitive manager for multiple reverse shells☆85Updated 4 months ago
- Python Obfuscator to generate One-Liners and FUD Payloads.☆162Updated 3 years ago
- Hunting for passwords with deep learning☆212Updated 11 months ago
- Simple HTTP listener for security testing☆113Updated 4 months ago
- Traps web spiders☆71Updated 4 years ago
- 🍳 The most delicious pentesting tool☆45Updated 3 years ago
- Wordlists handcrafted (and automated) with ♥☆218Updated last month
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆129Updated 5 months ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆111Updated last year
- Basic C2 Server☆189Updated 3 years ago
- A script that I made to get the essentials I use for various reasons on Kali Linux.☆56Updated 2 years ago
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆58Updated last week
- ☆34Updated last year
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆326Updated 5 months ago
- All kinds of tiny shells☆58Updated 2 years ago
- 0xpat blog☆100Updated 3 years ago