seantmalone / HiveMind
Distributed File Storage Using JavaScript Botnets
☆114Updated 11 years ago
Alternatives and similar repositories for HiveMind:
Users that are interested in HiveMind are comparing it to the libraries listed below
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆26Updated 7 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 9 years ago
- Transparent proxying for I2P and forwarding other addresses to Tor or clearnet.☆34Updated 10 months ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆53Updated 2 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 10 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Anti-Anti-Automation Framework☆92Updated 10 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆21Updated 8 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆50Updated 7 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 10 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- log file scrubber☆15Updated 6 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆44Updated 8 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 5 years ago
- Spoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug☆85Updated 5 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 6 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆20Updated 9 years ago
- A python based https remote access trojan for penetration testing☆85Updated 9 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆36Updated 7 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 6 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29Updated 7 years ago
- Tools to help detect Hacking Team malware☆80Updated 9 years ago
- List of penetration testing tools.☆23Updated 4 years ago
- Hashcrack.org GPU-accelerated password cracker☆84Updated 8 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆143Updated 9 years ago
- Scraps for publicly accessible MongoDB instances and dumps user passwords☆31Updated 8 years ago