Script is a proof of concept how to control your machine by using social media sites.
☆23Feb 14, 2018Updated 8 years ago
Alternatives and similar repositories for Social-media-c2
Users that are interested in Social-media-c2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts related to offensiveosint.io☆23Jun 5, 2020Updated 5 years ago
- Small script for retrieving incoming transactions based on provided hour period.☆14Jan 24, 2022Updated 4 years ago
- Detect firearm and nudity on Twitter and Instagram☆14Mar 27, 2019Updated 7 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- This tool is embeds an android application with a msfvenom payload by using a embed ruby script it's just make the embeding more easier a…☆11May 3, 2017Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Pixel-perfect replica of Windows 10, simulated in the browser with Vanilla JS.☆17Dec 16, 2017Updated 8 years ago
- Windows privilege escalation workstation☆17Nov 22, 2015Updated 10 years ago
- Get a clean, ready-to-go Linux box in seconds.☆25Mar 12, 2024Updated 2 years ago
- Masking the Sethc.exe backdoor with an anti-detection system.☆29Dec 16, 2017Updated 8 years ago
- Collect information about leaks for particular domain in IntelX and present it on a tree view graph.☆29Jul 18, 2021Updated 4 years ago
- Keylogger using FTP server as an intermediate with some cool additional functions☆22Apr 15, 2017Updated 8 years ago
- Systemback_source-1.9.4☆15Jan 2, 2021Updated 5 years ago
- MiniPwner's website and forums aren't exactly clear on what you need to do. I'm here to help!☆20Jan 15, 2016Updated 10 years ago
- FROM BEGINNER TO ADVANCED FOR ALL SECURITY ENTHUSIASTS.☆18Mar 23, 2018Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- AN ESP32/8266 is used to receive sensor data from clients and then log and display the results☆22Sep 24, 2022Updated 3 years ago
- Botnet (Zombie Networks) with C# and Web Socket☆15Jul 8, 2014Updated 11 years ago
- Orwell is a RAT and Botnet designed as a trio of programs.☆31May 22, 2017Updated 8 years ago
- Exploit web-vulnerabilities☆23Apr 9, 2019Updated 7 years ago
- All the tools you need to make your own mind up from the Open Data Sets☆141Oct 17, 2022Updated 3 years ago
- Bypass AntiVirus with Python and Metasploit using shellcode☆11Mar 25, 2016Updated 10 years ago
- ☆37Feb 12, 2018Updated 8 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- Home of https://redteam.guide☆15Apr 1, 2026Updated last week
- LeakLooker GUI - Discover, browse and monitor database/source code leaks☆314Dec 8, 2022Updated 3 years ago
- Capture The Flag Information☆12Dec 7, 2018Updated 7 years ago
- some example ctf writeups☆27Oct 23, 2020Updated 5 years ago
- Script lets you gather malicious software and c&c servers from open source platforms like Malshare, Malcode, Google, Cymon - vxvault, cyb…☆40Oct 29, 2019Updated 6 years ago
- Industrial Control Systems Network Protocol Parsers (ICSNPP) - Genisys over TCP/IP☆22Mar 3, 2026Updated last month
- Adds back the /scores JSON API for ctftime.org☆13Aug 22, 2023Updated 2 years ago
- Build interactive map of cameras from Shodan☆1,265Jun 28, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- The hidden mstsc recorder player☆27Mar 9, 2020Updated 6 years ago
- Cyber stalker is a web application based tool to catch fake account users online☆19May 6, 2023Updated 2 years ago
- A reverse shell cheat-sheet tool☆39Mar 5, 2019Updated 7 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆41Mar 24, 2018Updated 8 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Oct 2, 2016Updated 9 years ago
- Making your own CTF☆26Jan 5, 2021Updated 5 years ago