utkusen / floodtrooperLinks
an ancient http botnet
☆15Updated 10 years ago
Alternatives and similar repositories for floodtrooper
Users that are interested in floodtrooper are comparing it to the libraries listed below
Sorting:
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 7 years ago
- Infecting PE☆24Updated 11 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- XSS payload designed to steal LastPass users' credentials☆16Updated 11 years ago
- packetstormsecurity.net exploit archive 133ch3r☆23Updated 14 years ago
- CTF Writeups☆18Updated 8 years ago
- Exploit Dev Wiki☆13Updated 11 years ago
- Arp spoof detection tool☆25Updated 8 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- python script to bypass cloudflare from command line. built upon cfscrape module.☆19Updated 5 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 10 years ago
- A simple tool to dump users in popular forums and CMS :)☆30Updated 7 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Metasploit Framework with Viproy installed.☆36Updated 8 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Updated 9 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 10 years ago
- Projects and POCs☆60Updated 11 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Updated 10 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆22Updated 2 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆13Updated 12 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆29Updated 8 years ago