an ultimate evidence wiper
☆64Mar 30, 2015Updated 10 years ago
Alternatives and similar repositories for house-party-protocol
Users that are interested in house-party-protocol are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- python version of "house party protocol" program☆24Mar 30, 2015Updated 10 years ago
- an ancient http botnet☆15Apr 4, 2015Updated 10 years ago
- ☆32May 9, 2021Updated 4 years ago
- Personalized wordlist generator with NLP, by analyzing tweets. (A.K.A crunch2049)☆136Dec 21, 2019Updated 6 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆108Aug 13, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- a benchmarking&stressing tool that can send raw HTTP requests☆165Sep 24, 2022Updated 3 years ago
- automated poetry generator in Turkish☆97Jan 18, 2019Updated 7 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- a low(zero) cost threat intelligence&response tool against phishing domains☆157Dec 8, 2022Updated 3 years ago
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- a recon tool that finds sensitive data inside the screenshots uploaded to prnt.sc☆647Jan 23, 2025Updated last year
- A password cracking IRC bot☆18May 24, 2014Updated 11 years ago
- an open source ransomware honeypot☆911Jan 27, 2016Updated 10 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Remotely accessible Tor hidden service deployment suite☆24Dec 7, 2018Updated 7 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Security Advisories and Researches☆15Aug 19, 2014Updated 11 years ago
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆14Aug 11, 2023Updated 2 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆20Aug 27, 2021Updated 4 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Oct 28, 2016Updated 9 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27May 14, 2016Updated 9 years ago
- DLL to use the power of Pafish☆32Oct 5, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆19May 31, 2017Updated 8 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- Academic, Java, p2p, Messaging, Messenger, cyptography☆35Oct 18, 2014Updated 11 years ago
- Cryptowall Tooling & Information☆37Mar 3, 2016Updated 10 years ago
- Check read, write permissions on S3 buckets in your account☆20Jun 20, 2019Updated 6 years ago
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year
- Fully reset flipper and set it to the shipping state☆14Dec 6, 2023Updated 2 years ago
- Download SoundCloud artists in parallel☆10Jun 4, 2025Updated 9 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Credentials recovery project☆44Sep 28, 2016Updated 9 years ago
- Send mail with handlebars like templates☆25Dec 2, 2019Updated 6 years ago
- Interactive remote PowerShell Payload☆78Jan 21, 2016Updated 10 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆124Jun 22, 2018Updated 7 years ago
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆11Nov 26, 2020Updated 5 years ago
- Social Engineering Toys☆37Feb 1, 2016Updated 10 years ago
- Location service☆23Feb 13, 2026Updated last month