an ultimate evidence wiper
☆64Mar 30, 2015Updated 10 years ago
Alternatives and similar repositories for house-party-protocol
Users that are interested in house-party-protocol are comparing it to the libraries listed below
Sorting:
- python version of "house party protocol" program☆24Mar 30, 2015Updated 10 years ago
- ☆32May 9, 2021Updated 4 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆108Aug 13, 2018Updated 7 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- The Bitmark Device☆10Oct 13, 2015Updated 10 years ago
- Personalized wordlist generator with NLP, by analyzing tweets. (A.K.A crunch2049)☆136Dec 21, 2019Updated 6 years ago
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- automated poetry generator in Turkish☆97Jan 18, 2019Updated 7 years ago
- Fully reset flipper and set it to the shipping state☆13Dec 6, 2023Updated 2 years ago
- Using Deviare to Cheat on Games: Intercepting Direct3D COM objects and making walls invisible☆13Jul 1, 2013Updated 12 years ago
- Remotely accessible Tor hidden service deployment suite☆24Dec 7, 2018Updated 7 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- a benchmarking&stressing tool that can send raw HTTP requests☆165Sep 24, 2022Updated 3 years ago
- Security Advisories and Researches☆15Aug 19, 2014Updated 11 years ago
- A script for easily building customized images of pentesting distros (Kali and ParrotSec).☆17Dec 1, 2020Updated 5 years ago
- MailWriter is a tool aiming to write or overwrite files on PSVita's memcard (known as ux0) through a vulnerability in the Email applicati…☆16Sep 4, 2015Updated 10 years ago
- Public repo of Nuclei scanner templates.☆21May 22, 2023Updated 2 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- a low(zero) cost threat intelligence&response tool against phishing domains☆157Dec 8, 2022Updated 3 years ago
- an open source ransomware honeypot☆909Jan 27, 2016Updated 10 years ago
- Social Engineering Toys☆37Feb 1, 2016Updated 10 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Oct 28, 2016Updated 9 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆20Aug 27, 2021Updated 4 years ago
- Cryptowall Tooling & Information☆37Mar 3, 2016Updated 10 years ago
- Botnet IRC C&C Created in python language, developed for language learning☆11May 26, 2016Updated 9 years ago
- Improved version of David Elliott's SerialKDPProxy☆31Mar 19, 2019Updated 6 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆124Jun 22, 2018Updated 7 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- New and Improved☆17May 7, 2016Updated 9 years ago
- Objective-C Binary Documentation Tool. Think classdump with a hyperlinked GUI.☆45Mar 14, 2010Updated 15 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Apr 20, 2015Updated 10 years ago
- Send mail with handlebars like templates☆25Dec 2, 2019Updated 6 years ago
- a recon tool that finds sensitive data inside the screenshots uploaded to prnt.sc☆648Jan 23, 2025Updated last year
- Xpress Compression Algorithm☆25Oct 23, 2022Updated 3 years ago
- Simple PE packer with RtlCompressBuffer☆21Sep 20, 2015Updated 10 years ago
- A mirror of "103_top_shell.rar" since the original disappeared.☆25Sep 27, 2015Updated 10 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Jul 10, 2017Updated 8 years ago