an ancient http botnet
☆15Apr 4, 2015Updated 10 years ago
Alternatives and similar repositories for floodtrooper
Users that are interested in floodtrooper are comparing it to the libraries listed below
Sorting:
- python version of "house party protocol" program☆24Mar 30, 2015Updated 10 years ago
- an ultimate evidence wiper☆64Mar 30, 2015Updated 10 years ago
- ☆32May 9, 2021Updated 4 years ago
- Botnet IRC C&C Created in python language, developed for language learning☆11May 26, 2016Updated 9 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- a more complex ransomware honeypot☆125Mar 27, 2016Updated 9 years ago
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- Website for draco, the OverTheWire warzone☆12Sep 7, 2015Updated 10 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 8 years ago
- C++/C botnet using HTTP C&C☆16Jan 21, 2015Updated 11 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆20Aug 27, 2021Updated 4 years ago
- Check read, write permissions on S3 buckets in your account☆20Jun 20, 2019Updated 6 years ago
- This is the python wrapper for The Security Framework SRDF☆49Apr 29, 2014Updated 11 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- Location service☆23Feb 13, 2026Updated 2 weeks ago
- A(nother) Binary Analysis Framework☆30Jun 10, 2014Updated 11 years ago
- An opensource project similar to HoneyDocs☆26Oct 10, 2015Updated 10 years ago
- ⛓ Blockchain parser for Python☆28Dec 27, 2017Updated 8 years ago
- This repository for training application security.☆26Aug 9, 2019Updated 6 years ago
- A library implementing CVSS v2 and v3 scores☆31Mar 7, 2020Updated 5 years ago
- POC for utilizing wikipedia API for Command and Control☆28Dec 8, 2022Updated 3 years ago
- 🍓 🤥🍍If threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxy☆24Jun 18, 2018Updated 7 years ago
- automated poetry generator in Turkish☆97Jan 18, 2019Updated 7 years ago
- Remotely accessible Tor hidden service deployment suite☆24Dec 7, 2018Updated 7 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Mar 12, 2014Updated 11 years ago
- Using LibVMI to detect malware☆32Apr 3, 2022Updated 3 years ago
- Create custom Windows batch files from a configuration file☆32Oct 29, 2016Updated 9 years ago
- Una aplicación del clima del curso de Node☆11Mar 6, 2019Updated 6 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Oct 17, 2016Updated 9 years ago
- Personalized wordlist generator with NLP, by analyzing tweets. (A.K.A crunch2049)☆136Dec 21, 2019Updated 6 years ago
- ☆26Sep 2, 2016Updated 9 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75May 8, 2018Updated 7 years ago
- App para Descargar Videos de Youtube☆11Jun 20, 2016Updated 9 years ago
- A small and dirty python3 based script to download courses from Infosec Institute.☆12Oct 6, 2021Updated 4 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆32Aug 13, 2021Updated 4 years ago
- OllyHeapTrace is a plugin for OllyDbg to trace the heap operations being performed by a process.☆55Nov 4, 2011Updated 14 years ago
- ☆16May 13, 2021Updated 4 years ago
- ☆10Jul 23, 2022Updated 3 years ago