huntergregal / botHunter
Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for uploading samples to VirusTotal
☆48Updated 8 years ago
Alternatives and similar repositories for botHunter:
Users that are interested in botHunter are comparing it to the libraries listed below
- PHP Phishing Framework☆28Updated 11 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Data exfiltration PoC scripts☆23Updated 9 years ago
- A collection of Nmap NSE scripts that I made.☆27Updated 12 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- ☆47Updated 9 years ago
- Some of my Nmap scripts☆21Updated 7 years ago
- python code to connect to mail servers and pillage the data contained within☆9Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- EmPyre Web Interface☆12Updated 7 years ago
- pentest toolbox☆28Updated 2 years ago
- µphisher spear phishing tool (reference implementation)☆39Updated 4 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Projects and POCs☆59Updated 10 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆55Updated 4 years ago
- SQL Injection without the pain of syringes.☆25Updated 7 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 7 years ago
- ~ BannerGrab☆26Updated 8 years ago
- A web app scanner☆26Updated 11 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- ssh session type for metasploit☆98Updated 2 years ago
- A set of compiled application restriction bypasses☆29Updated 7 years ago