utkusen / house-party-protocol
an ultimate evidence wiper
☆63Updated 9 years ago
Related projects: ⓘ
- python version of "house party protocol" program☆25Updated 9 years ago
- an ancient http botnet☆15Updated 9 years ago
- an ancient irc botnet☆12Updated 9 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆28Updated 8 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 10 years ago
- Simple security surveillance script for linux distributions.☆56Updated 7 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆59Updated 9 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆19Updated 8 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆57Updated 8 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆25Updated 10 years ago
- ☆41Updated this week
- ☆55Updated 7 years ago
- Useful pentesting scripts☆81Updated 7 years ago
- Tools for harvesting email addresses for phishing attacks |☆83Updated 9 years ago
- General tools and scripts i want to make public to the world.☆44Updated 5 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆166Updated 9 years ago
- Metasploit things, modules, plugins, exploits☆24Updated 10 years ago
- ☆49Updated this week
- Poison, reset, spoof, redirect MITM script☆124Updated last year
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- Bind 2 exe's and have them run at the same time.☆44Updated 9 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆56Updated 9 years ago
- Use Tor for anonymous scanning with nmap☆77Updated 9 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆144Updated 3 years ago
- Tools that are related to pentest and network security☆94Updated 3 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆30Updated 7 years ago
- Credentials recovery project☆44Updated 7 years ago
- 🍓 🤥🍍If threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxy☆26Updated 6 years ago
- Ruby script for spoofing SMTP emails.☆43Updated last year
- ☆33Updated this week