lc-thomas / clash_royale_botLinks
A simple bot that open chests for you.
☆14Updated 6 years ago
Alternatives and similar repositories for clash_royale_bot
Users that are interested in clash_royale_bot are comparing it to the libraries listed below
Sorting:
- General tools and scripts i want to make public to the world.☆46Updated 6 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- A script to help set up an event handler in order to install a persistent backdoor that can be activated by sending a message.☆177Updated 5 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- Repository of my Computer and Information Security work.☆67Updated 7 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆80Updated 7 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆95Updated 13 years ago
- ☆92Updated 7 years ago
- Windows Remote Post Breach Tool via Telegram☆134Updated 7 years ago
- A centralized location for all presentations I've given at various conferences☆26Updated 8 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 7 years ago
- Metasploit Framework☆26Updated last week
- Extract Sense out of Gibberish stuff☆81Updated 8 years ago
- #HackingTogether☆13Updated 8 years ago
- ☆11Updated 8 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 8 years ago
- Node JS code for a set of Alexa voice skills designed to assist hackers and developers with common tasks☆56Updated 6 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Updated 9 years ago
- Stargate☆95Updated 9 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 9 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆103Updated 8 years ago
- Tools for 802.11 information gathering.☆119Updated 3 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆141Updated 7 years ago
- Not another SCA. Lists of interesting regular expressions for searching code for security issues. Think FuzzDB for SCA.☆15Updated 8 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆87Updated 11 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- Visual Basic GUI: A Tool to Inject Keystrokes on a SSH Client via an X11 Forwarded Session☆63Updated 7 years ago
- Source Code Intelligence☆30Updated 8 years ago