utkusen / house-party-protocolView external linksLinks
an ultimate evidence wiper
☆65Mar 30, 2015Updated 10 years ago
Alternatives and similar repositories for house-party-protocol
Users that are interested in house-party-protocol are comparing it to the libraries listed below
Sorting:
- python version of "house party protocol" program☆24Mar 30, 2015Updated 10 years ago
- an ancient http botnet☆15Apr 4, 2015Updated 10 years ago
- ☆32May 9, 2021Updated 4 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Aug 13, 2018Updated 7 years ago
- a more complex ransomware honeypot☆125Mar 27, 2016Updated 9 years ago
- The Bitmark Device☆10Oct 13, 2015Updated 10 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- Personalized wordlist generator with NLP, by analyzing tweets. (A.K.A crunch2049)☆136Dec 21, 2019Updated 6 years ago
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- Using Deviare to Cheat on Games: Intercepting Direct3D COM objects and making walls invisible☆13Jul 1, 2013Updated 12 years ago
- Fully reset flipper and set it to the shipping state☆12Dec 6, 2023Updated 2 years ago
- a benchmarking&stressing tool that can send raw HTTP requests☆164Sep 24, 2022Updated 3 years ago
- A script for easily building customized images of pentesting distros (Kali and ParrotSec).☆17Dec 1, 2020Updated 5 years ago
- a low(zero) cost threat intelligence&response tool against phishing domains☆157Dec 8, 2022Updated 3 years ago
- Gophish Python cli to perform huge phishing campaigns☆39Oct 19, 2018Updated 7 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 7 years ago
- MailWriter is a tool aiming to write or overwrite files on PSVita's memcard (known as ux0) through a vulnerability in the Email applicati…☆16Sep 4, 2015Updated 10 years ago
- an open source ransomware honeypot☆908Jan 27, 2016Updated 10 years ago
- Social Engineering Toys☆37Feb 1, 2016Updated 10 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Oct 28, 2016Updated 9 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆20Aug 27, 2021Updated 4 years ago
- Botnet IRC C&C Created in python language, developed for language learning☆11May 26, 2016Updated 9 years ago
- Improved version of David Elliott's SerialKDPProxy☆31Mar 19, 2019Updated 6 years ago
- New and Improved☆17May 7, 2016Updated 9 years ago
- Check read, write permissions on S3 buckets in your account☆20Jun 20, 2019Updated 6 years ago
- DLL to use the power of Pafish☆32Oct 5, 2021Updated 4 years ago
- Objective-C Binary Documentation Tool. Think classdump with a hyperlinked GUI.☆45Mar 14, 2010Updated 15 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Apr 20, 2015Updated 10 years ago
- Xpress Compression Algorithm☆24Oct 23, 2022Updated 3 years ago
- Send mail with handlebars like templates☆25Dec 2, 2019Updated 6 years ago
- Bash scripts to help setup port redirects with iptables☆16Apr 22, 2017Updated 8 years ago
- ☆19May 31, 2017Updated 8 years ago
- A mirror of "103_top_shell.rar" since the original disappeared.☆25Sep 27, 2015Updated 10 years ago
- Location service☆23Jan 23, 2026Updated 3 weeks ago
- ☆22Jul 7, 2017Updated 8 years ago
- A simple scanner to find and brute force tomcat manager logins☆27Dec 11, 2019Updated 6 years ago