utkusen / house-party-protocol
an ultimate evidence wiper
☆64Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for house-party-protocol
- python version of "house party protocol" program☆25Updated 9 years ago
- an ancient http botnet☆15Updated 9 years ago
- an ancient irc botnet☆12Updated 9 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75Updated 6 years ago
- Simple security surveillance script for linux distributions.☆58Updated 7 years ago
- ☆51Updated 12 years ago
- A simple trojan in python, disguised as an animated ASCII bunny (for pedagogical purposes)☆47Updated 3 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 8 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆166Updated 9 years ago
- A fast and advanced ransomware PoC☆60Updated 9 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆56Updated 9 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆79Updated 5 years ago
- Automatic backdooring apk with meterpreter (PoC)☆51Updated 8 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆146Updated 3 years ago
- Multi-threaded SSH Password Auditor☆92Updated 10 years ago
- PoC Android smart phone botnet☆76Updated 12 years ago
- Social Engineering Toys☆36Updated 8 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 10 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆60Updated 9 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 10 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆26Updated 10 years ago
- malwares src dump☆39Updated 7 years ago
- Bind 2 exe's and have them run at the same time.☆45Updated 10 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆20Updated 8 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆115Updated 8 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 7 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆25Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago