prophetl33t / ShodanCPP
ShodanCPP is a С++ library for accessing the Shodan API.
☆33Updated 9 months ago
Alternatives and similar repositories for ShodanCPP
Users that are interested in ShodanCPP are comparing it to the libraries listed below
Sorting:
- Malware and malicious applications database☆38Updated 11 months ago
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆75Updated 11 months ago
- ☆46Updated last year
- ☆24Updated last year
- 「💽」MBR Overwrite malware for linux☆26Updated 5 months ago
- Light C++ Winsock Wrapper Library☆35Updated 7 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆40Updated 3 years ago
- 0day Windows/x64 Inject All Processes With Meterpreter Reverse Shell Shellcode (655 bytes)☆53Updated 3 years ago
- WikiLeaks Vault 7 CIA Hacking Tools☆46Updated 7 years ago
- Simple console based Windows key-logger created in C++☆15Updated 3 years ago
- Cross-platform RAT, written in C☆86Updated 2 years ago
- Advanced Vulnerability Scanner Tool☆70Updated 11 months ago
- Repositório do Curso de Ghidra☆19Updated 4 years ago
- MyDoom source☆61Updated 9 years ago
- a simple assembly bootloader using nasm and Intel syntax☆10Updated 3 years ago
- DNS over HTTPS targeted malware (only runs once)☆97Updated last year
- 0xpat blog☆100Updated 3 years ago
- List of resources and projects for operating system development.☆45Updated 11 months ago
- Some Batch scripts that can cause temporary and permanent disruption of service. ( just for fun)☆12Updated 4 years ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆74Updated last year
- A small set of functions for RE detection on x86_64 Linux☆17Updated last year
- This repo contains my writeups and code from YouTube videos☆36Updated last month
- Simple C# malware that steals Discord token from .ldb files and from memory☆60Updated 3 years ago
- Multifunctional keylogger using WinAPI and libcurl☆17Updated 3 years ago
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.☆37Updated 6 months ago
- Exploit development challenges!☆24Updated 2 years ago
- A tool that encrypt and hide your data inside your images.☆30Updated 3 years ago
- conti locker ransomware source code leak☆31Updated 3 years ago
- A snake game written in x86 Assembly language for windows console☆32Updated 6 years ago
- XSS vulnerability scanner written in Python☆16Updated 2 years ago