visualbasic6 / drain
bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.
☆37Updated 4 months ago
Related projects: ⓘ
- A tool for creating bitcoin stealing phishing clones of onion services on large scale☆29Updated last year
- A reconnaissance tool for ethical hackers written in RUST☆20Updated 5 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆15Updated 2 years ago
- ☆36Updated this week
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆20Updated 5 months ago
- Crawls URL to get a better image of what is tied to a website.☆31Updated last year
- Self replicating and automatically spreading SSH worm that recovers login credentials☆39Updated last year
- AI Powered Terminal Based Ethical Hacking Assistant☆48Updated 4 months ago
- Capture screenshots of onion services on an onion service.☆50Updated 3 months ago
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆54Updated last year
- Rust Weaponization for Red Team Engagements.☆29Updated last year
- ☆23Updated this week
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆23Updated 5 months ago
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆40Updated 9 months ago
- quick and dirty proof-of-concept to hide shells in images☆48Updated 2 months ago
- ECC Public Key Cryptography☆33Updated 10 months ago
- Tool for bypassing logins vulnerable against SQL injection☆39Updated 5 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆58Updated 6 months ago
- Helping you delete your old accounts☆86Updated last year
- Create and enumerate hidden desktops.☆86Updated 9 months ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆12Updated 2 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆104Updated 2 years ago
- Legba recipes.☆37Updated 3 weeks ago
- An End to End Encrypted SMS and SMS Tunneling app☆41Updated last year
- 𓃌 - Exploit faster with simplicity and ease using Axer☆39Updated 7 months ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 10 months ago
- List of Hardware Wallets for Digital Forensics☆25Updated last month
- masscan with exclusive excludes☆55Updated 10 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆124Updated 2 months ago
- This tool uses the GitHub API to scan repositories owned by a user for email addresses and associated names. It provides options to scan …☆19Updated last year