lc-thomas / clash_royale_botLinks
A simple bot that open chests for you.
☆14Updated 7 years ago
Alternatives and similar repositories for clash_royale_bot
Users that are interested in clash_royale_bot are comparing it to the libraries listed below
Sorting:
- A script to help set up an event handler in order to install a persistent backdoor that can be activated by sending a message.☆178Updated 5 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 8 years ago
- General tools and scripts i want to make public to the world.☆46Updated 6 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- Removed according to regulations☆35Updated 8 years ago
- Advanced Controller/Server/Client Reverse Shell/Bot – Windows/Linux – Python☆68Updated 9 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Updated 7 years ago
- CyberCrowl is a python Web path scanner tool☆24Updated 7 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆73Updated 9 years ago
- Node JS code for a set of Alexa voice skills designed to assist hackers and developers with common tasks☆56Updated 6 years ago
- A Cross-Platform Forensic Framework for Google Chrome☆71Updated 10 years ago
- Universal MITM web server☆106Updated 8 years ago
- Chat with hacker assistant☆194Updated 8 years ago
- #HackingTogether☆14Updated 9 years ago
- Tools for 802.11 information gathering.☆119Updated 3 years ago
- A python based https remote access trojan for penetration testing☆84Updated 10 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆96Updated 14 years ago
- Take full control of a OSX user or root account via command line.☆101Updated 7 years ago
- A centralized location for all presentations I've given at various conferences☆26Updated 8 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- Windows Remote Post Breach Tool via Telegram☆134Updated 7 years ago
- ssh public host key scanner using shodan☆118Updated 6 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Updated 5 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- Not another SCA. Lists of interesting regular expressions for searching code for security issues. Think FuzzDB for SCA.☆15Updated 9 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Updated 10 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Updated 7 years ago
- A curated list of awesome resources for tracking vulnerabilities in software☆18Updated 8 years ago
- This repository contains some bettercap transparent proxy example modules.☆16Updated 8 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago