The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a kill signal. This script periodically checks the content of a file hosted at the provided URL and executes or halts execution based on the response. It also includes functionality for self-destruction.
☆18Aug 7, 2024Updated last year
Alternatives and similar repositories for Kill-The-Code
Users that are interested in Kill-The-Code are comparing it to the libraries listed below
Sorting:
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- Script en bash de Nmap que se puede personalizar para ajustar el escaneo a tus necesidades.☆12Jul 20, 2024Updated last year
- PersonaAI is a versatile tool designed to perform psychological profiling based on a person's Facebook ID.☆13Aug 21, 2024Updated last year
- Windows kernel☆12Oct 15, 2020Updated 5 years ago
- Automated tool for domains & Subdomains Gathering☆14Feb 25, 2024Updated 2 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆65Jul 18, 2024Updated last year
- Yet another awesome fuzzers list☆15Oct 25, 2024Updated last year
- A PoC for a malicious Confluence plugin.☆16Aug 15, 2024Updated last year
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆45Mar 24, 2025Updated 11 months ago
- raTrix is a powerful Android administration tool designed for Linux systems. It utilizes Python on the client-side and Java on the server…☆21Dec 28, 2024Updated last year
- ☆21Dec 2, 2024Updated last year
- A simple port scanner using python☆16Jan 28, 2023Updated 3 years ago
- CrlfiX☆21Jan 30, 2025Updated last year
- Herramienta hecha en Bash para rastrear una IP Pública.☆21Mar 30, 2021Updated 4 years ago
- ☆10Jan 13, 2025Updated last year
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆24May 1, 2025Updated 9 months ago
- This home-lab provides individuals with hands-on experience in setting up, configuring, and utilizing Suricata to enhance network securit…☆30Apr 10, 2024Updated last year
- Herramienta para escanear y listar dispositivos activos en la red local sin obtener tanta información como en NMAP y sin tener que saber…☆28Aug 12, 2024Updated last year
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆22Nov 6, 2024Updated last year
- Determine if an email address exists or not on ProtonMail with NeutrOSINT☆34Dec 14, 2025Updated 2 months ago
- A powerful and fully automated bot designed to help users complete various Discord tasks efficiently. The bot supports multiple quest typ…☆29Jan 28, 2026Updated 3 weeks ago
- Windows kernel driver encryption library, support base64, aes-256, rsa-2048 and higher, ecc-256, single file, minimal dependence, support…☆22May 20, 2021Updated 4 years ago
- A simple PDF summarizer with Node.js and groq-sdk☆11Jan 11, 2025Updated last year
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆56Jun 30, 2025Updated 7 months ago
- ☆43Jul 17, 2025Updated 7 months ago
- Pyfuscator is a Python tool designed to obfuscate Python scripts by encoding and encrypting them. It allows you to transform your Python …☆31Aug 9, 2024Updated last year
- ☆28Sep 9, 2024Updated last year
- This tool allows you to get the approximate location of a Wi-Fi access point (AP) using the long-awaited: Wigle.net API.☆33Mar 3, 2023Updated 2 years ago
- Jam CCTV Camera using DOS attack☆39May 27, 2024Updated last year
- ☆33Jul 4, 2023Updated 2 years ago
- This is a guide to understand Flag categories for Trace Labs OSINT Search Party CTF events☆32Aug 18, 2023Updated 2 years ago
- ☆32Apr 16, 2025Updated 10 months ago
- Herramienta para realizar fuerza bruta a diferentes servicios.☆10Sep 13, 2021Updated 4 years ago
- ☆11Feb 28, 2022Updated 3 years ago
- This tool allows you to get the approximate location of a Bluetooth device using the long-awaited: Wigle.net API.☆37Mar 3, 2023Updated 2 years ago
- ☆20Aug 6, 2025Updated 6 months ago
- Passive Web Vulnerability Detection Tool☆37May 5, 2025Updated 9 months ago
- ☆35Mar 28, 2025Updated 10 months ago