hathcox / ToorChat
An Chat Program for use with the ToorCon 2013 badge.
☆21Updated 12 years ago
Alternatives and similar repositories for ToorChat:
Users that are interested in ToorChat are comparing it to the libraries listed below
- Scripts and tools for ISM hacking☆15Updated 7 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Updated 5 years ago
- Framework for Making Environmental Keyed Payloads☆13Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- Exploit Pack - One step ahead☆11Updated 11 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Updated 7 years ago
- Software exploitation training material☆15Updated 7 years ago
- Wardriving ekoparty☆15Updated 7 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 7 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back …☆15Updated 7 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.☆21Updated 7 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 6 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆22Updated 8 years ago
- first commit☆10Updated 8 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Metasploit Logos that use Z for the new zArch additions☆10Updated 9 years ago
- RFID spoofing code from scanlime.org☆19Updated 12 years ago
- Simple php backdoor based on extension☆22Updated 10 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- PowerShell Reverse HTTPs Shell☆27Updated 10 years ago
- Search bing with python☆12Updated 10 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- ☆17Updated 8 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago