utkusen / house-party-protocol
an ultimate evidence wiper
☆64Updated 9 years ago
Alternatives and similar repositories for house-party-protocol:
Users that are interested in house-party-protocol are comparing it to the libraries listed below
- python version of "house party protocol" program☆25Updated 9 years ago
- an ancient http botnet☆15Updated 9 years ago
- an ancient irc botnet☆12Updated 9 years ago
- Simple security surveillance script for linux distributions.☆58Updated 8 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75Updated 6 years ago
- A Python program that scans RAM.☆39Updated 10 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆21Updated 8 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆57Updated 9 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆26Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Proof-of-concept python IRC botnet for orchestrating macOS computers (harmless due to SIP & Gatekeeper)☆83Updated 3 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 10 years ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆15Updated 8 years ago
- yet another solution for dining philosophers problem☆6Updated 9 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆15Updated 8 years ago
- Capstone: Keylogger Trojan☆35Updated 6 years ago
- Use Tor for anonymous scanning with nmap☆80Updated 9 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- PoC Android smart phone botnet☆78Updated 12 years ago
- Scenario-based WiFi Network Threat Simulation☆9Updated 5 years ago
- Passive recon / OSINT automation script☆40Updated 6 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆33Updated 8 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- A fast and advanced ransomware PoC☆60Updated 9 years ago
- a simple blackjack game supported by card counting and basic strategy☆10Updated 9 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆61Updated 9 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 8 years ago