pbmartins / nyptoLinks
⭕️💰 Network monitoring solution to detect crypto-mining on local machines.
☆31Updated 7 years ago
Alternatives and similar repositories for nypto
Users that are interested in nypto are comparing it to the libraries listed below
Sorting:
- Python implementation of the SlowLoris DoS attack.☆24Updated 8 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆29Updated 6 years ago
- yet another dirbuster☆19Updated 4 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 5 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 5 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- The official command line client for IPFinder☆11Updated 6 years ago
- A Mozilla Firefox extension which allows quick access to your google-dorking result☆20Updated 5 years ago
- Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass☆14Updated 4 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- IDS/IPS malware download evasion☆15Updated 6 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Updated 8 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- ☆18Updated last year
- :e-mail: Enumerate usernames through SMTP service☆18Updated 5 years ago
- Reverse Shell as a Service☆32Updated 4 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- Random Tips and Writeups.☆13Updated 6 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- a collection of bash script and python to automate ZAP Security Tests☆11Updated 4 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆23Updated 7 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago