utkusen / janibot
an ancient irc botnet
☆12Updated 9 years ago
Related projects: ⓘ
- an ancient http botnet☆15Updated 9 years ago
- python version of "house party protocol" program☆25Updated 9 years ago
- Scenario-based WiFi Network Threat Simulation☆9Updated 5 years ago
- a simple blackjack game supported by card counting and basic strategy☆10Updated 9 years ago
- wifiDOS with scapy☆16Updated 8 years ago
- yet another solution for dining philosophers problem☆6Updated 9 years ago
- Subdomain Finder Application has 2 tools and 4 web services. With these we are finding the subdomains of the domain.☆11Updated 7 years ago
- Simple shellcode injector.☆13Updated 5 years ago
- Brute-force script for finding azorult XOR key.☆14Updated 5 years ago
- 🍓 🤥 🍍If threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxy☆26Updated 6 years ago
- Automatically exported from code.google.com/p/hookme☆13Updated 8 years ago
- ☆55Updated 7 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆19Updated 3 years ago
- edge --> powerpoint --> remote-file --> shell☆13Updated 5 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Updated 4 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆22Updated 6 years ago
- Simple And Fast Subdomain Take Over Checker☆9Updated 5 years ago
- Abuses Powershell Profiles☆13Updated 8 years ago
- ☆18Updated this week
- Arduino's version of Rubber ducky project watched in mr robot (based on https://www.hak5.org/blog/15-second-password-hack-mr-robot-style)☆34Updated 6 years ago
- URLScan Go API client☆7Updated 3 years ago
- Shellcode / Buffer Overflow 💣☆18Updated 4 years ago
- Ransomware Decryptors☆33Updated 2 years ago
- ☆29Updated this week
- Optional plugins for MITMf☆15Updated 9 years ago
- ☆17Updated 4 years ago
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆14Updated 9 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆26Updated 7 years ago
- Automated Password Dumper for Web Browsers☆15Updated 10 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆25Updated 7 years ago