A password cracking IRC bot
☆18May 24, 2014Updated 11 years ago
Alternatives and similar repositories for Replicant
Users that are interested in Replicant are comparing it to the libraries listed below
Sorting:
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- Network aware keylogger: broadcasting on your local area network.☆22Jul 29, 2013Updated 12 years ago
- A Cracking Tool for open Wifis with login pages☆22May 2, 2013Updated 12 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- ☆48May 29, 2024Updated last year
- ☆22Apr 16, 2017Updated 8 years ago
- ☆19May 31, 2017Updated 8 years ago
- PoC Android smart phone botnet☆79Aug 4, 2012Updated 13 years ago
- This project is an AP Computer Science project.☆10Apr 8, 2010Updated 15 years ago
- Resurrecting and updating the best log cleaner☆36Jan 2, 2015Updated 11 years ago
- Unix remote login tool, rootkit shell tool☆32Jun 11, 2015Updated 10 years ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆37May 20, 2013Updated 12 years ago
- portfolio website for graphic designers☆11Jan 25, 2018Updated 8 years ago
- Access nearly every directory from within a sandboxed application.☆23Aug 12, 2010Updated 15 years ago
- Command line tools I install after jailbreaking☆11Feb 11, 2017Updated 9 years ago
- Web graphic designers decide how websites look, making choices about layout, fonts, and images to create usable and aesthetically pleasin…☆11Sep 27, 2021Updated 4 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Oct 28, 2016Updated 9 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆41Oct 14, 2021Updated 4 years ago
- A fast python tool for creating permutations of alphanumerics☆11Mar 22, 2020Updated 5 years ago
- Default repositories for MacForge☆12Jun 22, 2020Updated 5 years ago
- HTTP AUTH cli brute force script written in PHP☆14Jun 26, 2012Updated 13 years ago
- ITSearchField is a subclass of NSSearchField, which can collapse and expand if you click the search icon.☆40Jan 16, 2013Updated 13 years ago
- Wireshark CITP Lua Disector☆11Mar 13, 2020Updated 5 years ago
- Password management and cracking training☆13Jul 15, 2025Updated 7 months ago
- Random Codes Related to Reverse Engineering☆10Nov 24, 2022Updated 3 years ago
- Scripts to install and run ansible to provision any machines and allow development with vagrant☆11Jun 2, 2022Updated 3 years ago
- Library for Object Linking and Embedding (OLE) data types☆12Nov 27, 2025Updated 3 months ago
- guestAccount☆11Sep 6, 2013Updated 12 years ago
- An arduino based gps tracker that transmits data over a GSM shield☆16Jan 13, 2014Updated 12 years ago
- ☆15Aug 13, 2014Updated 11 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 6 years ago
- (OS X) Drains battery of laptops via a script. Originally used in an educational-setting to store computers over the summer.☆10May 5, 2014Updated 11 years ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 14 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Tools for GitHub issue and milestone consolidation across projects.☆63May 27, 2015Updated 10 years ago
- Python script for querying the apple servers for the location of wifi access points☆14May 31, 2024Updated last year
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago