osteth / DemonBucketLinks
Public File Sharing Network for Demonsaw
☆17Updated 8 years ago
Alternatives and similar repositories for DemonBucket
Users that are interested in DemonBucket are comparing it to the libraries listed below
Sorting:
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Detect snooper on your system!☆84Updated 8 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Whitelist Tor exit relays to allowing Tor users access your CloudFlare-protected site without CAPTCHA's☆62Updated 8 years ago
- everything that does not fit elsewhere☆12Updated 7 years ago
- NetHunter android application☆8Updated 6 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Shell script to create an onion-router for your Raspberry Pi from a stock Moebius image☆28Updated 10 years ago
- CVE-2015-3152 PoC☆43Updated 10 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- A patch for cryptsetup which adds the option to nuke all keyslots given a certain passphrase.☆186Updated 6 years ago
- List of penetration testing tools.☆23Updated 5 years ago
- Fast asynchronous DNS Scanner/bruteforcer☆18Updated 13 years ago
- Tools to help detect Hacking Team malware☆79Updated 9 years ago
- ☆54Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- voodoo networking: post-VPN session obfuscation for a post-Snowden world☆34Updated 6 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Advanced Controller/Server/Client Reverse Shell/Bot – Windows/Linux – Python☆68Updated 9 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- ☆12Updated 8 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆24Updated 11 years ago