fabrimagic72 / twitintLinks
Twitter Bot to perform advanced search and automated response
☆13Updated 7 years ago
Alternatives and similar repositories for twitint
Users that are interested in twitint are comparing it to the libraries listed below
Sorting:
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 9 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Updated 8 years ago
- Random stuff☆16Updated 7 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- Just a collection of scripts☆40Updated 5 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Intelligent threat hunter and phishing servers☆48Updated 6 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 8 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- Self contained htaccess shells and attacks☆14Updated 7 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Various snippets created during malware analysis☆22Updated 7 years ago
- This repo is all about myself coded exploit codes :)☆55Updated 5 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- Automated script to search in SMB protocol for availables pipe names☆23Updated 7 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Updated 2 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- My metasploit modules☆23Updated 9 years ago