d4rkcat / skybot
Skype4Py bot
☆17Updated 10 years ago
Alternatives and similar repositories for skybot:
Users that are interested in skybot are comparing it to the libraries listed below
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆11Updated 11 years ago
- Home made trojan (c/c++)☆11Updated last year
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆19Updated 10 years ago
- Shellshock Test☆7Updated 3 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆21Updated 8 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- A ruby self contained, low resource consuming HTTP transparent proxy designed for the WiFi Pineapple MKV.☆17Updated 9 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Updated 8 years ago
- SockStress DoS (Denial of Service) exploit written in Python |☆38Updated 9 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20Updated 8 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Updated 9 years ago
- Fingerprint server side technology☆28Updated 11 years ago
- ☆12Updated 8 years ago
- µphisher spear phishing tool (reference implementation)☆38Updated 4 years ago
- SSH Based Remote Administration Tool☆105Updated 9 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆28Updated 8 years ago
- A python script for obfuscating wireless networks☆76Updated 8 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆60Updated 9 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago