pbmartins / nyptoLinks
βοΈπ° Network monitoring solution to detect crypto-mining on local machines.
β31Updated 7 years ago
Alternatives and similar repositories for nypto
Users that are interested in nypto are comparing it to the libraries listed below
Sorting:
- SWF Vulnerability & Information Scannerβ18Updated 7 years ago
- Python implementation of the SlowLoris DoS attack.β24Updated 8 years ago
- yet another dirbusterβ18Updated 5 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLYβ23Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.β23Updated 6 years ago
- The Hall of Ancient Exploitation Toolsβ16Updated 6 years ago
- Miscellaneous exploit scriptsβ17Updated 3 years ago
- Simple mods to wpa_supplicant to allow more efficient online brutingβ19Updated 6 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.β48Updated 5 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergencyβ12Updated 5 years ago
- My personal tech blogβ16Updated last year
- Working exploit code for CVE-2019-17625β19Updated 5 years ago
- edge --> powerpoint --> remote-file --> shellβ11Updated 6 years ago
- Very loud vBulletin exploitβ14Updated 5 years ago
- β40Updated 7 years ago
- Decoders for 7ev3n ransomwareβ17Updated 9 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Headβ¦β20Updated 5 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to themβ36Updated 7 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.β35Updated last year
- Port scanning and domain utility.β29Updated 8 years ago
- A fully featured Windows backdoor that uses email as a C&C serverβ16Updated 8 years ago
- Shock the shell! Exploit many injection method for shellshockβ18Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.β17Updated 8 years ago
- Free Email Providersβ11Updated 2 years ago
- BlueKeep powershell scanner (based on c# code)β39Updated 6 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugsβ23Updated 6 years ago
- Phoenix based exploit kit for educational purpose.β17Updated 7 years ago
- Fresh malware samples caught in the wild daily from random places. π£β19Updated 6 years ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcodeβ12Updated 4 years ago
- Burp Suite Extension useful to inspect UPnP securityβ16Updated 4 years ago