x-yzt / mixturesLinks
Mixtures.info website source code.
☆10Updated 6 months ago
Alternatives and similar repositories for mixtures
Users that are interested in mixtures are comparing it to the libraries listed below
Sorting:
- A curated list of awesome Arch-related projects,softwares and resources.☆13Updated 4 years ago
- fully automated c# reverse shells with automated ssh tunneling☆6Updated 4 years ago
- SkyRAT - Powershell Remote Administration Tool☆33Updated 7 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- Tools for hunting security threats☆12Updated 5 years ago
- a simple, barely functional, prototyping RAT (Remote Administration Tool)☆9Updated 8 years ago
- A simple, lightweight Remote Access Tool written in Python☆17Updated 6 years ago
- Various exploits☆10Updated 8 years ago
- Generate CIA/NSA style project codenames☆22Updated 7 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆17Updated 7 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- Normalizing bash administration and development across different OS-es and distributions☆10Updated last year
- Discord botnet bot written in python☆10Updated 8 years ago
- Work in Progress repo☆14Updated 6 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆13Updated 3 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆25Updated 6 years ago
- Educational Python penetration testing framework☆9Updated 7 years ago
- A RAT, script that controls other pcs remotly, for educational purposes only☆13Updated last year
- Hackable Windows SandBox environment☆31Updated 2 years ago
- Additional aliases for scoop to ease updating and searching for apps.☆13Updated 4 years ago
- Multi-head SSH honeypot system.☆21Updated last year
- AES Ransomware in batch☆11Updated last year
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆52Updated 4 years ago
- pen testing scripts☆12Updated 4 years ago
- Just Enough C2 - A simple but effective server and implant☆9Updated 3 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆12Updated 5 years ago
- Notes on offensive training☆16Updated 7 years ago