Captive wifi hotspot bypass tool for Linux
☆65Jan 17, 2019Updated 7 years ago
Alternatives and similar repositories for anubis
Users that are interested in anubis are comparing it to the libraries listed below
Sorting:
- Reverse/ Bind Shell Generator for cross platform systems☆17Sep 2, 2018Updated 7 years ago
- pentesting tool for noob hackers.Runs on linux and termux☆69Sep 2, 2021Updated 4 years ago
- Its like airgeddon but better!☆60Jul 27, 2024Updated last year
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- ip-keyloger☆10Jan 9, 2026Updated last month
- SkyRAT - Powershell Remote Administration Tool☆34Jan 8, 2018Updated 8 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- ☆11Nov 5, 2022Updated 3 years ago
- Todos los scripts y locuras del Blog SniferL4bs que sean desarrollados vendran en esta pequeña sección dedicada☆21Jun 22, 2024Updated last year
- this android application detects the fake towers(base stations)☆10Oct 5, 2017Updated 8 years ago
- ☆11Mar 2, 2019Updated 7 years ago
- OverWatchINT is an Open Source Intelligence and All-in-One Hacking Tool. It's purpose is to reduce the time and efforts of security resea…☆11May 15, 2022Updated 3 years ago
- Movement Detector using python☆10Jan 5, 2021Updated 5 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- Encrypted botnet traffic generator☆11Jan 26, 2016Updated 10 years ago
- Simple code to resolve library functions at runtime☆10Jan 5, 2015Updated 11 years ago
- P2P cryto-currency with dashpay and blackcoin Hybird feature☆12Feb 28, 2022Updated 4 years ago
- Educational Java Bot Virus☆10Mar 14, 2020Updated 5 years ago
- A platform Where A User can Find the Online Presence of Social Media Handle on the Internet.☆12Apr 10, 2021Updated 4 years ago
- ☆12Mar 4, 2023Updated 3 years ago
- CLI Chrome Extension (CRX) Packer written in Python☆16Nov 2, 2013Updated 12 years ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- Get ports,vulnerabilities,informations,banners,..etc for any IP with Shodan (no apikey! no rate-limit!)☆25Jun 3, 2020Updated 5 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- Tool to dump cisco device configs via snmp and/or add new users☆13Feb 23, 2026Updated last week
- Simple website to automatically generate string encryption/decryption routines for C#☆10Feb 12, 2022Updated 4 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- Tool to identify all domains contained in an IP anonymously☆15Jun 4, 2017Updated 8 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆14Apr 8, 2024Updated last year
- ☆12Jan 25, 2020Updated 6 years ago
- DOSrat by Criper98 ~ Un Remote Administrator Tool in ITA per Windows☆10Oct 14, 2022Updated 3 years ago
- A port of Rack for the JavaScript JSGI web server interface☆36Oct 14, 2010Updated 15 years ago
- Kali Linux on Raspberry PI 3, 3b+ Post Install☆15Nov 24, 2020Updated 5 years ago
- DLInjector for Graphical User Interface.☆35Jan 28, 2021Updated 5 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- Help recover passwords / etc. that were incorrectly entered with a typo☆13Jan 24, 2017Updated 9 years ago
- Python3 tool to perform password spraying using RDP☆16Aug 14, 2023Updated 2 years ago
- 🀄️ WebShell Backdoor Framework☆16Jun 7, 2018Updated 7 years ago