fabrimagic72 / twitintLinks
Twitter Bot to perform advanced search and automated response
☆13Updated 7 years ago
Alternatives and similar repositories for twitint
Users that are interested in twitint are comparing it to the libraries listed below
Sorting:
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- The Python Password-Protected Obfuscator☆34Updated 6 years ago
- (Unofficial) Python API for http://ransomwaretracker.abuse.ch/tracker/☆16Updated 8 years ago
- Automated script to search in SMB protocol for availables pipe names☆23Updated 7 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆32Updated 8 years ago
- NCC Group Ransomware Simulator☆69Updated 9 years ago
- Generate customized and undetectable exploits for Metasploit.☆24Updated 8 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Updated 8 months ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- Random stuff☆16Updated 7 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Another Repo of Malware. Enjoy. <3☆59Updated 6 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆47Updated 8 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Updated 2 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- ☆26Updated 5 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Updated 7 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- ☆24Updated 9 years ago