Block excessive crawlers, bots and spiders traffic on your web site πΎ
β34Jul 29, 2023Updated 2 years ago
Alternatives and similar repositories for Blackhole
Users that are interested in Blackhole are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- rwwwshell: Getting a reverse shell with Mr. Robot ;)β36Jul 16, 2020Updated 5 years ago
- Hacking every email by use script Mr.Robotβ57Sep 1, 2018Updated 7 years ago
- This is Jester ransomware like, in Mr Robot movie (coded by Darlene S1E2,3), Please beware warning, after start you can't recover the filβ¦β410May 20, 2020Updated 5 years ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one commandβ21Jun 15, 2015Updated 10 years ago
- Guidance for blocking outdated web technologies. #nsacyberβ63Dec 9, 2021Updated 4 years ago
- Passive JavaScript reconnaissance for penetration testers β bridging Burp Suite traffic into structured, AST-based analysis in VSCode.β36Feb 5, 2026Updated last month
- Bitcoin seeds bruteforcer / checker | First legit toolβ22Aug 26, 2022Updated 3 years ago
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive Kβ¦β13Jan 10, 2021Updated 5 years ago
- playing classic game using termuxβ12Jun 2, 2022Updated 3 years ago
- Terminal with voice AI and bannerβ13Jul 29, 2025Updated 7 months ago
- Es un framework de cΓ³digo abierto para la auditoria en seguridad informΓ‘tica.β13Oct 12, 2025Updated 5 months ago
- #Simple program to track someone by send malicious linkβ13May 17, 2020Updated 5 years ago
- CVE-2019-2525 / CVE-2019-2548β11Sep 4, 2020Updated 5 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyberβ61Sep 4, 2018Updated 7 years ago
- gui tool to create normal payload by msfvenomβ34Dec 26, 2018Updated 7 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy β¦β1,252Mar 9, 2020Updated 6 years ago
- Generate reverse shells in command line with Go !β20Aug 9, 2020Updated 5 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.β37Nov 16, 2023Updated 2 years ago
- A Windows 11 Rootkit. (Exploit has been patched)β16Sep 7, 2025Updated 6 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.β19May 29, 2023Updated 2 years ago
- Aids in discovering HTTP and HTTPS connectivity issues. #nsacyberβ114Feb 19, 2021Updated 5 years ago
- Script to Exploit Buffer_overflow (0)-Day vulnerability & executes the command remotely on target system.β16Nov 7, 2020Updated 5 years ago
- Python-based vulnerability detection tool for web applicationsβ18Jul 31, 2024Updated last year
- A simple utility to perform reverse WHOIS lookups using whoisxml APIβ45Aug 9, 2023Updated 2 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.β11Apr 27, 2024Updated last year
- Herramienta hecha en Bash para rastrear una IP PΓΊblica.β21Mar 30, 2021Updated 4 years ago
- πΌπ°πππ΄π-πΌπ³ ππ·π°πππ°πΏπΏ πππ΄π π±πΎπ π²ππ΄π°ππ΄π³ π±π πΌπ ππ°π·π°π½ πΎπ΅π²____π¨βπ»ββ10Nov 21, 2024Updated last year
- Kernel Modules Source for NOTHING Phone(2a)β19Updated this week
- ππ Red Network Tool is a tool for network exploration and info finding.β41Mar 26, 2022Updated 3 years ago
- β28Sep 10, 2022Updated 3 years ago
- Generic TWRP tree for device that use boot header v4 and build dedicated recovery_ramdisk in vendor_bootβ18Jun 1, 2023Updated 2 years ago
- Network/WebApplication Information Gathering, Enumeration and Vulnerability Scanning (Under Development)β16Feb 2, 2019Updated 7 years ago
- An open-source .NET Ransomwareβ22Aug 2, 2021Updated 4 years ago
- mac80211_hwsim modifications and related stuffβ24Feb 26, 2012Updated 14 years ago
- Portfolio, BillingSytem, Levanter Bot, Retail shopβ10Dec 4, 2025Updated 3 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.β52Jul 15, 2023Updated 2 years ago
- A driver created to bypass the anti-cheat and r/w memory through itβ15Aug 3, 2024Updated last year
- MacroExploit use in excel sheetβ20Jun 12, 2023Updated 2 years ago
- first http brute force brute force any website we wantβ30Dec 18, 2018Updated 7 years ago