Block excessive crawlers, bots and spiders traffic on your web site πΎ
β34Jul 29, 2023Updated 2 years ago
Alternatives and similar repositories for Blackhole
Users that are interested in Blackhole are comparing it to the libraries listed below
Sorting:
- rwwwshell: Getting a reverse shell with Mr. Robot ;)β36Jul 16, 2020Updated 5 years ago
- Mr. Robot's EvilCorp Terminal style for your shellβ41Jun 3, 2016Updated 9 years ago
- Hacking every email by use script Mr.Robotβ57Sep 1, 2018Updated 7 years ago
- This is Jester ransomware like, in Mr Robot movie (coded by Darlene S1E2,3), Please beware warning, after start you can't recover the filβ¦β406May 20, 2020Updated 5 years ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one commandβ21Jun 15, 2015Updated 10 years ago
- Wifi network scanning tool for capturing WPA/WPA2 Handshakesβ27Jan 19, 2021Updated 5 years ago
- Passive JavaScript reconnaissance for penetration testers β bridging Burp Suite traffic into structured, AST-based analysis in VSCode.β36Feb 5, 2026Updated 3 weeks ago
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive Kβ¦β13Jan 10, 2021Updated 5 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.β11Apr 27, 2024Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.β19May 29, 2023Updated 2 years ago
- #Simple program to track someone by send malicious linkβ14May 17, 2020Updated 5 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.β37Nov 16, 2023Updated 2 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applicaβ¦β22May 14, 2025Updated 9 months ago
- gui tool to create normal payload by msfvenomβ34Dec 26, 2018Updated 7 years ago
- Bitcoin seeds bruteforcer / checker | First legit toolβ21Aug 26, 2022Updated 3 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml APIβ45Aug 9, 2023Updated 2 years ago
- An Raspberry PI 2 OpenWRT Image Setup To Be A Wireless Hacking Sandboxβ38Oct 9, 2015Updated 10 years ago
- MacroExploit use in excel sheetβ20Jun 12, 2023Updated 2 years ago
- Use hashcat to crack WPA2 PSK (Pre-Shared Key) passwords!β78Aug 18, 2018Updated 7 years ago
- Generate reverse shells in command line with Go !β20Aug 9, 2020Updated 5 years ago
- Vulnerable demo application for the race conditionβ22Apr 27, 2021Updated 4 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.β52Jul 15, 2023Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.β26Jul 14, 2024Updated last year
- π€ The Modern Port Scanner π€β22Jul 1, 2021Updated 4 years ago
- Claude Code νκ΅μ΄ μ λ¬Έ κ°μ΄λ | Korean Beginner Guide for Claude Codeβ40Updated this week
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.β61Aug 19, 2024Updated last year
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.β31Oct 7, 2024Updated last year
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic β¦β36May 1, 2025Updated 10 months ago
- β29May 16, 2023Updated 2 years ago
- Web Penetration Testing Course Materialsβ32May 13, 2024Updated last year
- An open-source .NET Ransomwareβ22Aug 2, 2021Updated 4 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy β¦β1,249Mar 9, 2020Updated 5 years ago
- Tool Bash para automatizar y penetrar fallas de SQL en sitios webs.β28Jun 4, 2025Updated 9 months ago
- first http brute force brute force any website we wantβ30Dec 18, 2018Updated 7 years ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Courseraβ11Jun 22, 2020Updated 5 years ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research toolβ34Jan 18, 2026Updated last month
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticalβ¦β31Dec 26, 2023Updated 2 years ago
- This repository offers a thorough explanation of the Diffie-Hellman export grade attack, accompanied by a demo.β10Apr 18, 2025Updated 10 months ago
- Simple Python script to sort nuclei scans by severity and URLβ29May 24, 2023Updated 2 years ago