cr0mll / deserterLinks
A targeted DNS cache poisoner
☆122Updated 2 years ago
Alternatives and similar repositories for deserter
Users that are interested in deserter are comparing it to the libraries listed below
Sorting:
- Meterpreter Reverse shell over TOR network using hidden services☆90Updated 3 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆169Updated 4 months ago
- A proof of concept email spoofing tool built on Docker.☆128Updated 4 years ago
- Hunting for passwords with deep learning☆217Updated last year
- ☆232Updated 2 years ago
- 🍳 The most delicious pentesting tool☆45Updated 3 years ago
- Simple & Customizable DNS Data Exfiltrator☆110Updated 2 years ago
- A WLAN red team framework.☆157Updated 10 months ago
- LD_PRELOAD rootkit☆135Updated last year
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- https://github.com/BC-SECURITY/Empire☆49Updated 2 years ago
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆259Updated last year
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆211Updated 3 months ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆55Updated 2 years ago
- A web front-end for password cracking and analytics☆381Updated 3 months ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 3 years ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated 10 months ago
- My Password Cracking Methodology☆82Updated 2 years ago
- Polymorphic Command & Control☆89Updated 5 months ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆109Updated last year
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆67Updated 4 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆179Updated last year
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆58Updated 3 months ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆269Updated 2 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆132Updated last year
- Repository and archive for Killing The Bear Gitbook☆83Updated 2 years ago
- A silly PAM module to allow authentication as any user with a single password.☆62Updated 5 years ago