Something something, botnet, blah something
☆22Mar 29, 2015Updated 10 years ago
Alternatives and similar repositories for pxpwn
Users that are interested in pxpwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Visualize your CRITs IOC's in Maltego☆12Jan 13, 2015Updated 11 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 8 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- Exploring retweets by Twitter bot-nets.☆11Aug 30, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- ☆11Apr 23, 2019Updated 6 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Oct 13, 2021Updated 4 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Search for URLs in files (optionally limited by extension) and validate their HTTP status code☆24Mar 24, 2020Updated 6 years ago
- API Tools☆27Apr 18, 2016Updated 9 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Apr 13, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- Rust procedural macro to insert a few asm! calls full of junk instructions in between every line of code.☆13May 27, 2023Updated 2 years ago
- Simple netcat wrote in C☆16Jun 25, 2025Updated 9 months ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Aug 1, 2021Updated 4 years ago
- Mis proyectos de marketing aplicando AI☆11Oct 31, 2025Updated 4 months ago
- Keep track of a GSM device and show its location on a map☆11Apr 14, 2016Updated 9 years ago
- IR remote control for my Car PC. Emulates keyboard and mouse USB HID Combo device.☆10Jan 30, 2016Updated 10 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆10Aug 2, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- A NodeJS Template for a Twitter Bot that Tracks Transactions to Bitcoin Wallets☆20May 7, 2018Updated 7 years ago
- Windows Defender Bypass for Cobalt Strike v4.0 Powershell Payload☆10Aug 29, 2020Updated 5 years ago
- AdminX it's a Malware to execute process as some users from a Windows OS☆11May 4, 2023Updated 2 years ago
- A way to get fake followers on Clubhouse☆10Jan 6, 2022Updated 4 years ago
- A Python script that runs a machine learning analysis on data from RaiGames.io to predict the next crash.☆11Jun 21, 2022Updated 3 years ago
- Code that allows running another windows PE in the same address space as the host process.☆11Nov 19, 2019Updated 6 years ago
- ☆10Jul 1, 2024Updated last year
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A Silent Miner that mines Crypto - XMR and ETH☆16Feb 5, 2023Updated 3 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- ☆10Jun 1, 2022Updated 3 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Feb 4, 2021Updated 5 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- convert javascript shellcode to c source code☆11Mar 27, 2020Updated 6 years ago