A simple xss bot template
☆22Sep 21, 2020Updated 5 years ago
Alternatives and similar repositories for LBot
Users that are interested in LBot are comparing it to the libraries listed below
Sorting:
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- A simple script for quickly mining sensitive information in binary files.☆30Dec 1, 2020Updated 5 years ago
- Pollute phishing kits with fake credentials☆12Dec 17, 2021Updated 4 years ago
- ☆17Nov 24, 2020Updated 5 years ago
- ☆46Jul 13, 2021Updated 4 years ago
- The king of shell -Javaweb Memory Shell☆26Mar 29, 2023Updated 2 years ago
- Zoomeye Tools是配合Zoomeye使用的Chrome插件☆45Jan 18, 2022Updated 4 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Jan 7, 2018Updated 8 years ago
- 修改nmap的特征流量,过 emergingthreats 的公开ids规则。☆21Aug 14, 2019Updated 6 years ago
- Collection of popular phishing websites.☆30Aug 24, 2022Updated 3 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- Domain Blocklist☆10Aug 21, 2024Updated last year
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- ☆10Aug 9, 2024Updated last year
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Feb 7, 2026Updated 3 weeks ago
- POC for RCE using vulnerabilities described in VMSA-2023-0001☆148Jan 31, 2023Updated 3 years ago
- ☆11Dec 5, 2024Updated last year
- 团队更名为 QAX A-TEAM☆10Apr 28, 2019Updated 6 years ago
- Windows日志清除工具☆10Apr 3, 2023Updated 2 years ago
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- ☆39May 7, 2020Updated 5 years ago
- Some wordpress user enumeration scripts.☆38Dec 21, 2016Updated 9 years ago
- ☆11Nov 10, 2020Updated 5 years ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- The implementation of sdhash, the algorithm to calculate similarity digests, rewritten in pure go language 🐹☆10Jan 17, 2021Updated 5 years ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated last month
- The Tool will fetch the article links for you, based on your query. Enter anything you want to search, whether a vulnerability descriptio…☆10Jan 2, 2021Updated 5 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Mar 2, 2021Updated 4 years ago
- 类似淘宝物流详情的时间轴效果☆10Aug 8, 2016Updated 9 years ago
- YoudaoNote to WizNote,有道云笔记数据迁移为知笔记☆12Dec 4, 2018Updated 7 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- Farm-to-table, organic, handcrafted, delicious Webassembly☆14Dec 7, 2021Updated 4 years ago
- PHP DDoS/Stress Test☆10Feb 7, 2026Updated 3 weeks ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆60Jun 26, 2023Updated 2 years ago
- This is a script that accesses subreddits and downloads media based on keywords from the submission title.☆13Mar 9, 2020Updated 5 years ago