evilsocket / coffee
Smarter Coffee terminal client.
☆95Updated 8 years ago
Alternatives and similar repositories for coffee:
Users that are interested in coffee are comparing it to the libraries listed below
- Stargate☆94Updated 8 years ago
- Automatic backdooring apk with meterpreter (PoC)☆51Updated 8 years ago
- ☆25Updated 7 years ago
- Removed according to regulations☆35Updated 7 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 7 years ago
- A Simple ARP Spoofer using Scapy☆103Updated 9 years ago
- ☆135Updated 9 years ago
- Hashcrack.org GPU-accelerated password cracker☆84Updated 8 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 7 years ago
- Linux Memory Cryptographic Keys Extractor☆235Updated last year
- Express security essentials deployment for Linux Servers☆58Updated 4 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29Updated 7 years ago
- ☆119Updated 5 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆135Updated 7 years ago
- AutoBrowser Screenshot☆48Updated 8 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- A set of Python scripts for generating, parsing, sorting, and saving wordlists.☆50Updated 3 years ago
- OpenSSH remote DOS exploit and vulnerable container☆53Updated 7 years ago
- Vulnerable Web applications Generator☆84Updated 7 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- My zsh, bash and vim dot files☆68Updated 5 years ago
- A python based https remote access trojan for penetration testing☆85Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- F.Security Framwork☆19Updated 8 years ago
- Tools for 802.11 information gathering.☆119Updated 2 years ago
- Scan/Exploit Blueborne CVE-2017-0785☆30Updated 6 years ago
- Automated WiFi limit evasion☆119Updated 8 years ago
- A powerful and extensible wireless drop box☆265Updated 6 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆15Updated 9 years ago