secretsquirrel / GhostInTheNet
Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan
☆9Updated 6 years ago
Alternatives and similar repositories for GhostInTheNet:
Users that are interested in GhostInTheNet are comparing it to the libraries listed below
- Undetectable Windows Payload Generation☆10Updated 7 years ago
- Checks if a windows machine with the smb service actve is vulnerable to the CVEs of a CSV file passed as argument to the script☆12Updated 2 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- Tutorials for getting started with Pwntools☆12Updated 2 years ago
- Various exploits☆10Updated 7 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 8 years ago
- Wireless Miniaturized Device☆19Updated 6 years ago
- All xxx-arsenal repos in one☆15Updated 5 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 8 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Updated 11 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 9 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆12Updated 4 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆45Updated 9 months ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆38Updated 6 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Software exploitation training material☆15Updated 7 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- A Gmail credential harvester☆11Updated 7 months ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 11 years ago
- first commit☆10Updated 8 years ago
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆8Updated 7 years ago
- Python tool for Dorking☆11Updated last year
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆12Updated 6 years ago
- A full-fledged msfrpc library for Metasploit framework.☆13Updated 7 years ago
- Collection of cracked malware☆14Updated 6 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago
- pen testing scripts☆9Updated 3 years ago