mustafadalga / dns-spoof
DNS isteklerini veya trafiği kendi istediğiniz yere yönlendirerek hedef web sitesini manipüle etmenize yarayan bir script.
☆16Updated 4 years ago
Alternatives and similar repositories for dns-spoof:
Users that are interested in dns-spoof are comparing it to the libraries listed below
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Updated 4 years ago
- ☆15Updated 3 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Updated 7 years ago
- Easy to understand back door written in python☆34Updated 2 years ago
- Python'un scapy modülü kullanılarak aynı ağda bulunan cihazların ip ve mac adreslerini listeyen script.☆13Updated 4 years ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware…☆45Updated last year
- MIRAI botnet in python3☆18Updated 5 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- A semi-automatic osint/recon framework.☆24Updated 11 months ago
- Hacking Tools Z0172CK☆31Updated last year
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 4 years ago
- Simple keylogger on C++ with several functions.☆17Updated 4 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 4 years ago
- Cryptowall Ransomware from Mr Robot serie S2E1 and S2E2☆25Updated 11 months ago
- Ro3b - Advance Banking HTTP Botnet☆49Updated last year
- (Windows/Linux/Mac) Remote Administration Tool☆64Updated 4 years ago
- A multi-client reverse shell that allows multiple connections from target computers || Hedef bilgisayarlardan gelen birden fazla bağlan…☆19Updated 3 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Updated 6 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆16Updated 4 years ago
- JitterBug passively searches for Basic Info, open ports, potential CVE's on the given Target IP in third party databases without Direct i…☆12Updated 3 years ago
- Embedding executable files in PDF Documents☆44Updated 6 years ago
- this makes your payloads, trojans, viruses fully undetectable☆7Updated 7 years ago
- Fully Undetectable telegram Rat dropper☆35Updated 4 years ago
- Open-source windows ransomware created for educational purposes☆21Updated 4 years ago
- Aynı ağ içerisinde , ARP Spoofing saldırısı yapılmış hedef bilgisayarın ziyaret ettiği , HTTP protokolünü kullanan web sitelerine kod enj…☆19Updated 4 years ago
- A builder for BatchStealer☆22Updated 2 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆18Updated 4 years ago
- Password Recovery Toolkit For Windows Written in Python 3☆26Updated last year
- Fully Undetectable Native C++ Remote Access Agent / Botnet.☆88Updated 5 years ago