woj-ciech / Social-media-c2View external linksLinks
Script is a proof of concept how to control your machine by using social media sites.
☆23Feb 14, 2018Updated 8 years ago
Alternatives and similar repositories for Social-media-c2
Users that are interested in Social-media-c2 are comparing it to the libraries listed below
Sorting:
- Scripts related to offensiveosint.io☆23Jun 5, 2020Updated 5 years ago
- Detect firearm and nudity on Twitter and Instagram☆14Mar 27, 2019Updated 6 years ago
- Pixel-perfect replica of Windows 10, simulated in the browser with Vanilla JS.☆17Dec 16, 2017Updated 8 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- iOS forensics utility☆12May 8, 2018Updated 7 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- This tool is embeds an android application with a msfvenom payload by using a embed ruby script it's just make the embeding more easier a…☆11May 3, 2017Updated 8 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- ☆10Jul 24, 2017Updated 8 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- Masking the Sethc.exe backdoor with an anti-detection system.☆29Dec 16, 2017Updated 8 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- Cyber stalker is a web application based tool to catch fake account users online☆18May 6, 2023Updated 2 years ago
- A Simple C&C Server Written In Python☆35Nov 6, 2018Updated 7 years ago
- All the tools you need to make your own mind up from the Open Data Sets☆141Oct 17, 2022Updated 3 years ago
- A simple CLI tool to check WebDAV vulnerability☆14Aug 13, 2021Updated 4 years ago
- Bypass AntiVirus with Python and Metasploit using shellcode☆11Mar 25, 2016Updated 9 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- Industrial Control Systems Network Protocol Parsers (ICSNPP) - Genisys over TCP/IP☆22Nov 19, 2025Updated 2 months ago
- FROM BEGINNER TO ADVANCED FOR ALL SECURITY ENTHUSIASTS.☆18Mar 23, 2018Updated 7 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆31May 22, 2017Updated 8 years ago
- Windows privilege escalation workstation☆17Nov 22, 2015Updated 10 years ago
- ☆17Jan 20, 2021Updated 5 years ago
- Intentionally vulnerable Ruby on Rails web application for learning purposes☆17Sep 11, 2009Updated 16 years ago
- IPSec testing tool☆19Oct 19, 2024Updated last year
- ☆275Feb 20, 2021Updated 4 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆41Mar 24, 2018Updated 7 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Feb 13, 2021Updated 5 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Oct 2, 2016Updated 9 years ago
- Systemback_source-1.9.4☆14Jan 2, 2021Updated 5 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- Nothing interesting to see here. Old hack on the nfc-tools code, mirror of http://nfc-tools.googlecode.com/svn/trunk — see README.md for …☆51Jul 30, 2020Updated 5 years ago
- LeakLooker GUI - Discover, browse and monitor database/source code leaks☆309Dec 8, 2022Updated 3 years ago
- MiniPwner's website and forums aren't exactly clear on what you need to do. I'm here to help!☆20Jan 15, 2016Updated 10 years ago
- Minimalist Custom .NET Core Garbage Collector☆23Jun 15, 2020Updated 5 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22May 14, 2017Updated 8 years ago
- Commands to perform various activities related to penetration testing and red teaming☆20Jan 17, 2020Updated 6 years ago
- The system is broken face recognition for adversarial example testing.☆20Aug 18, 2021Updated 4 years ago