utkusen / house-party-protocol
an ultimate evidence wiper
☆64Updated 9 years ago
Alternatives and similar repositories for house-party-protocol:
Users that are interested in house-party-protocol are comparing it to the libraries listed below
- python version of "house party protocol" program☆25Updated 9 years ago
- an ancient http botnet☆15Updated 9 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆44Updated 8 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆167Updated 9 years ago
- Automatic backdooring apk with meterpreter (PoC)☆51Updated 8 years ago
- Simple security surveillance script for linux distributions.☆58Updated 8 years ago
- flood area with fake essids☆20Updated 7 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆57Updated 9 years ago
- Tools for harvesting email addresses for phishing attacks |☆84Updated 9 years ago
- Tools that are related to pentest and network security☆98Updated 3 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆58Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 10 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆21Updated 9 years ago
- A ctypes powered python keylogger.☆104Updated 5 years ago
- Poison, reset, spoof, redirect MITM script☆126Updated last year
- 🍓 🤥🍍If threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxy☆26Updated 6 years ago
- an ancient irc botnet☆12Updated 9 years ago
- pwning & info gathering via user browser☆39Updated 9 years ago
- A simple tool to dump users in popular forums and CMS :)☆29Updated 7 years ago
- Credentials recovery project☆44Updated 8 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 10 years ago
- A python based https remote access trojan for penetration testing☆85Updated 9 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆187Updated 5 years ago
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 10 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆25Updated 8 years ago
- This is php backdoor hack to access directory, access to mysql, access to execute shell command☆25Updated 9 years ago