utkusen / house-party-py
python version of "house party protocol" program
☆25Updated 9 years ago
Related projects: ⓘ
- an ancient irc botnet☆12Updated 9 years ago
- an ultimate evidence wiper☆63Updated 9 years ago
- 🍓 🤥🍍If threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxy☆26Updated 6 years ago
- an ancient http botnet☆15Updated 9 years ago
- a simple blackjack game supported by card counting and basic strategy☆10Updated 9 years ago
- Scenario-based WiFi Network Threat Simulation☆9Updated 5 years ago
- ☆12Updated this week
- 👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡☆30Updated 6 years ago
- yet another solution for dining philosophers problem☆6Updated 9 years ago
- ☆18Updated this week
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆19Updated 3 years ago
- Twintelligence is a free Twitter OSINT tool☆51Updated 3 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 5 years ago
- Arduino's version of Rubber ducky project watched in mr robot (based on https://www.hak5.org/blog/15-second-password-hack-mr-robot-style)☆34Updated 6 years ago
- ☆55Updated 7 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆25Updated 7 years ago
- ☆74Updated this week
- ☆29Updated this week
- 👻👁🔍📡 If an attacker has created a fake enterprise wireless network, my goal is to deceive him.☆18Updated 5 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆31Updated 9 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆32Updated 3 years ago
- ☆18Updated this week
- 🕵🏻📡👁🔍Analyzes all Open Wireless Networks for detect fake access points (Fingerprint)☆15Updated 6 years ago
- recon-ng Maltego local transform pack☆37Updated 10 years ago
- Sends some one a malicious payload through smtp and starts a listener with metasploit.☆34Updated 6 years ago
- A fully featured backdoor that uses Gmail as a C&C server☆19Updated 8 years ago
- Subdomain Finder Application has 2 tools and 4 web services. With these we are finding the subdomains of the domain.☆11Updated 7 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆30Updated 12 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Tool to identify all domains contained in an IP anonymously☆15Updated 7 years ago