isdrupter / xerxesLinks
The best DOS Tool Out There!
☆22Updated 8 years ago
Alternatives and similar repositories for xerxes
Users that are interested in xerxes are comparing it to the libraries listed below
Sorting:
- IP Cam Shell is a command line script for testing and exploiting a wide range of IP cameras as demonstrated by Craig Heffner in "Exploiti…☆140Updated 7 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 4 years ago
- Social Engineering Tool Oriented to facebook☆56Updated 8 years ago
- Prints the IPs on your local network that're sending the most packets☆151Updated 3 years ago
- Automatizated bash script to invade WPA2 networks with wordlist method☆18Updated 6 years ago
- A ctypes powered python keylogger.☆106Updated 5 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆50Updated 7 years ago
- A simple bash based metasploit automation tool!☆122Updated 2 years ago
- Simple security surveillance script for linux distributions.☆59Updated 8 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆188Updated 6 years ago
- Small backdoor using cookie.☆63Updated 8 years ago
- Show info about the author by facebook photo url☆39Updated 8 years ago
- Pastejacking - PasteZort☆84Updated 6 years ago
- Multiplatform payload dropper☆275Updated 3 years ago
- Web-based WiFi monitor☆64Updated 2 years ago
- Sets Transparent proxy tunnel through Tor, I2P, Privoxy, Polipo and modify DNS; Include Anonymizing Relay Monitor (arm), macchanger and w…☆314Updated 2 years ago
- Fake access point using dns spoof and ssl stripping☆22Updated 7 years ago
- php-cli vulnerability scanner☆78Updated 10 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- Massive arsenal of hacker tools...☆78Updated 7 years ago
- A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently.☆125Updated 2 years ago
- imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basi…☆77Updated 6 years ago
- DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995☆111Updated 6 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 9 years ago
- Social Engineering template for credential harvesting. (Facebook as an example).☆45Updated 7 years ago
- Red Login: SSH Brute-force Tools☆103Updated 7 years ago
- Capstone: Keylogger Trojan☆35Updated 7 years ago
- An automated Wireless RogueAP MITM attack framework.☆187Updated 6 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in p…☆86Updated 7 years ago
- PoC Android smart phone botnet☆78Updated 12 years ago