wille / webrtc-grabber
PoC grabbing IP address behind a VPN - Based of https://github.com/diafygi/webrtc-ips, saves all found addresses for anyone who visits with WebRTC
☆36Updated 9 years ago
Alternatives and similar repositories for webrtc-grabber:
Users that are interested in webrtc-grabber are comparing it to the libraries listed below
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- ARP poison and sniff with DNS spoofing, urlsnarf, driftnet, ferret, dsniff, sslstrip and tcpdump☆26Updated 10 years ago
- Removes any instance of jRAT on your machine☆18Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Some exploits for ZeroNights 0x03☆36Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆59Updated 9 years ago
- Educational Python penetration testing framework☆10Updated 7 years ago
- Simple php backdoor based on extension☆22Updated 10 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆45Updated 8 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆122Updated 9 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆57Updated 9 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆21Updated 8 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- WPS scan and pwn tool☆66Updated 5 years ago
- IPv6 address spoofing with the Neighbor Discovery Protocol☆52Updated 6 years ago
- Search exploits in multiple exploit databases!☆81Updated 4 years ago
- Unix remote-shell backdoor develop with Bash, Netcat, OpenSSL (data encryption with AES-128bit)☆25Updated 7 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆58Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- uses keywords from alert logs to send SMS☆24Updated 9 years ago
- rant blog about CryptoTrooper ransomware, its history, legacy and MalwareTech case☆12Updated 6 years ago
- Terminal Ip Lookup Tool☆56Updated 10 years ago
- Linux RDP Scanner and Bruteforcer Scripts☆61Updated 9 years ago
- A project to learn about malware and c++ coding☆22Updated 9 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago