A targeted DNS cache poisoner
☆124Oct 1, 2022Updated 3 years ago
Alternatives and similar repositories for deserter
Users that are interested in deserter are comparing it to the libraries listed below
Sorting:
- Conduct forensic investigation of suspicious domains, websites and other dangerous thing without the fear of being infected! A Live opera…☆18Jun 27, 2022Updated 3 years ago
- Bash script for CTF automating basic enumeration☆41Mar 1, 2022Updated 4 years ago
- Simple Docker image for OpenCanary in Python☆12Sep 10, 2025Updated 6 months ago
- Automatic reverse/bind shell generator cheat sheet.☆34Jan 9, 2023Updated 3 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- this is a small script for extracting questions from try hack me room ,and creating a MD file☆13Mar 6, 2023Updated 3 years ago
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- Burp Suite Extension useful to inspect UPnP security☆16Nov 9, 2021Updated 4 years ago
- (Sim)ulate (Ba)zar Loader☆27Nov 15, 2020Updated 5 years ago
- Alina POS Source Code + Rootkit☆23Nov 3, 2015Updated 10 years ago
- A Python obfuscator using HTTP Requests and Hastebin.☆50Jul 1, 2022Updated 3 years ago
- PassLock is a highly secured password manager that encrypts passwords using Advanced Encryption Standards (AES)☆64Feb 5, 2024Updated 2 years ago
- Data EXfiltration TestER☆21Aug 28, 2019Updated 6 years ago
- A Pictorial Book of Tor Hidden Services.☆26Dec 1, 2017Updated 8 years ago
- A subdomain reconnaissance scanner☆36Dec 8, 2022Updated 3 years ago
- PoC code of Shade BIOS (stripped) presented at Black Hat USA 2025☆61Jul 16, 2025Updated 8 months ago
- A repository to store Deep Web (onion domain) crawler, scraper, and NLP tools for Tor network.☆23Jul 15, 2016Updated 9 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Mar 11, 2026Updated last week
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆58Sep 7, 2023Updated 2 years ago
- 🐳 VMs are bloat. Dockerise your VAPT environment☆79Apr 19, 2025Updated 11 months ago
- Shellcode Loader | xss.is☆13Jul 26, 2024Updated last year
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- Fast CLI tool to find the parameters that can be used to find SSRF or Out-of-band resource load☆296Sep 22, 2024Updated last year
- dcsync bof☆46Feb 13, 2026Updated last month
- A simple multi-threaded distributed SSH brute-forcing tool written in Python☆461Oct 30, 2022Updated 3 years ago
- All known and unknown public POC's for wordpress themes and plugins☆79Jun 23, 2021Updated 4 years ago
- Simple rust fuzzer☆23Mar 17, 2021Updated 5 years ago
- AutoPoC Generator HoneyPoC☆36Dec 7, 2025Updated 3 months ago
- Adversary Simulation Framework☆38Aug 19, 2025Updated 7 months ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- This is a project with .net server crypter for bypass AV's Runtime detection.☆11Sep 8, 2017Updated 8 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- Community Eventing and Scripting examples☆18Aug 11, 2025Updated 7 months ago
- A deliberately vulnerable website used to showcase Dastardly from Burp Suite☆10Oct 6, 2025Updated 5 months ago
- Privacy Tools by CKTN☆24Aug 14, 2022Updated 3 years ago
- redteamrecipe.com☆24Feb 9, 2024Updated 2 years ago