d4rkcat / skybot
Skype4Py bot
☆17Updated 10 years ago
Alternatives and similar repositories for skybot:
Users that are interested in skybot are comparing it to the libraries listed below
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆35Updated 10 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆19Updated 10 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆21Updated 8 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Updated 13 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Updated 3 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16Updated 10 years ago
- SQL injection in Neutrino panel☆8Updated 9 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20Updated 8 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- python client/server keystroke logger☆21Updated 12 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- Try various exploits to get root☆18Updated 11 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Automated man-in-the-middle attack tool.☆50Updated 10 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Updated 9 years ago
- Multi theaded DNS bruteforcing☆12Updated 10 years ago
- The Horrific Omnipotent Rootkit☆22Updated 7 years ago
- SSH Based Remote Administration Tool☆105Updated 9 years ago
- This version touches disk for registry persistence.☆24Updated 9 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Updated 2 months ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- An evolving hacking framework written in python☆11Updated 10 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- ☆12Updated 8 years ago
- SockStress DoS (Denial of Service) exploit written in Python |☆38Updated 9 years ago
- various exploits☆31Updated 12 years ago