ivan-sincek / domain-extractor
Extract valid or partially valid domain names and IPs from malicious or invalid URLs.
☆8Updated last year
Related projects ⓘ
Alternatives and complementary repositories for domain-extractor
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th …☆10Updated 4 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 3 years ago
- Light C++ Logger Library☆18Updated 6 years ago
- Clone repository for Source Code secret anti-forensic tools Marble Framework CIA, Leaked by WikiLeaks.☆30Updated 7 years ago
- A simple AES malware crypter☆16Updated 6 years ago
- This is the ToRat client, a part of the ToRat Project.☆26Updated 5 years ago
- KeplerPulse is a tool that generates a Powershell command that once executed on a Machine, Downloads and executes your desired Executable…☆10Updated 2 years ago
- Cross platform system wide proxy server & TLS Interception library for Python☆22Updated last year
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 2 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆11Updated 7 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆10Updated 5 years ago
- Brute force a REST API query through WebSocket. Based on cURL.☆9Updated last year
- Finder Predator The Thief botnet panel☆7Updated 5 years ago
- A simple, lightweight Remote Access Tool written in Python☆15Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Updated 5 years ago
- PoC Remote Administration Tool☆11Updated 5 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- Spider or repeater to find all links.☆13Updated 3 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 6 years ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 3 years ago
- Conquer the deep ocean, host an .onion site fast!☆15Updated 2 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆11Updated 7 years ago
- Lists of the top attacking IP addresses trying to hack or compromise Wordpress web sites.☆8Updated 7 years ago
- Enter Product Key Volatile Environment LPE☆11Updated 2 years ago