cr0mll / deserter
A targeted DNS cache poisoner
☆119Updated 2 years ago
Alternatives and similar repositories for deserter
Users that are interested in deserter are comparing it to the libraries listed below
Sorting:
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 3 years ago
- ☆229Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆119Updated 6 months ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆266Updated 2 years ago
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆58Updated last week
- Simple & Customizable DNS Data Exfiltrator☆109Updated last year
- Venom is a library that meant to perform evasive communication using stolen browser socket☆381Updated last year
- A prototype malware C2 channel using x509 certificates over mTLS☆153Updated last year
- Exploit for CVE-2021-4034☆93Updated 3 years ago
- Basic C2 Server☆190Updated 3 years ago
- Hades Basic Command & Control Server☆88Updated last year
- Roast in the Middle☆292Updated 5 months ago
- Simple HTTP listener for security testing☆113Updated 5 months ago
- A WLAN red team framework.☆153Updated 7 months ago
- Python Obfuscator to generate One-Liners and FUD Payloads.☆164Updated 3 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆178Updated last month
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆255Updated last year
- msImpersonate - User account impersonation written in pure Python3☆107Updated 2 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆104Updated last year
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- LD_PRELOAD rootkit☆131Updated last year
- Fast and intuitive manager for multiple reverse shells☆85Updated 5 months ago
- Hunting for passwords with deep learning☆213Updated last year
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆111Updated last year
- Windows File Integrity -- an archive of information on installed Windows binaries.☆32Updated 2 years ago
- 🍳 The most delicious pentesting tool☆45Updated 3 years ago
- ☆46Updated 2 years ago
- My new C2 framework☆41Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆155Updated this week