seantmalone / HiveMindLinks
Distributed File Storage Using JavaScript Botnets
☆114Updated 12 years ago
Alternatives and similar repositories for HiveMind
Users that are interested in HiveMind are comparing it to the libraries listed below
Sorting:
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Anti-Anti-Automation Framework☆99Updated 11 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 11 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29Updated 8 years ago
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 9 years ago
- Metasploit things, modules, plugins, exploits☆26Updated 11 years ago
- Distributed wrapper around oclHashcat☆90Updated 5 months ago
- Hashcat Bash Scripts for bulk hash file processing☆52Updated 9 years ago
- SockStress DoS (Denial of Service) exploit written in Python |☆38Updated 9 years ago
- A python based https remote access trojan for penetration testing☆84Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75Updated 7 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 3 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆57Updated 10 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 6 years ago
- Spoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug☆86Updated 6 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 9 years ago
- Decentralized opsec panic button operating over UDP broadcasts and HTTP. Provides automatic ejection of encrypted drives as a safe-measur…☆225Updated 3 years ago
- ☆43Updated 11 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Tools to help detect Hacking Team malware☆79Updated 10 years ago
- Remotely accessible Tor hidden service deployment suite☆24Updated 6 years ago