All Projects β†’ Dccwbypassuac β†’ Similar Projects or Alternatives

831 Open source projects that are alternatives of or similar to Dccwbypassuac

Antiddos System
πŸ›‘οΈβš”οΈ Protect your web app from DDOS attack or the Dead Ping + CAPTCHA VERIFICATION in one line!
Stars: ✭ 173 (-23.79%)
Mutual labels:  hacking
Hackercouch
Hospitality for Hackers
Stars: ✭ 185 (-18.5%)
Mutual labels:  hacking
Effective Shell
Text, samples and website for my 'Effective Shell' series.
Stars: ✭ 204 (-10.13%)
Mutual labels:  hacking
Awesome Shodan Queries
πŸ” A collection of interesting, funny, and depressing search queries to plug into shodan.io πŸ‘©β€πŸ’»
Stars: ✭ 2,758 (+1114.98%)
Mutual labels:  hacking
Phonia
Phonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is to first gather standard information such as country, area, carrier and line type on any international phone numbers with a very good accuracy.
Stars: ✭ 221 (-2.64%)
Mutual labels:  hacking
Shodanwave
Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.
Stars: ✭ 183 (-19.38%)
Mutual labels:  exploit
Evil Ssdp
Spoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.
Stars: ✭ 204 (-10.13%)
Mutual labels:  hacking
Php Antimalware Scanner
AMWScan (PHP Antimalware Scanner) is a free tool to scan php files and analyze your project to find any malicious code inside it.
Stars: ✭ 181 (-20.26%)
Mutual labels:  exploit
Angularjs Csti Scanner
Automated client-side template injection (sandbox escape/bypass) detection for AngularJS.
Stars: ✭ 214 (-5.73%)
Mutual labels:  exploit
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-19.82%)
Mutual labels:  hacking
Pine
🌲 Aimbot powered by real-time object detection with neural networks, GPU accelerated with Nvidia. Optimized for use with CS:GO.
Stars: ✭ 202 (-11.01%)
Mutual labels:  hacking
Windows Hacks
Creative and unusual things that can be done with the Windows API.
Stars: ✭ 2,171 (+856.39%)
Mutual labels:  hacking
Nekobotv1
NekoBot | Auto Exploiter With 500+ Exploit 2000+ Shell
Stars: ✭ 225 (-0.88%)
Mutual labels:  exploit
Butthax
lovense hush buttplug exploit chain
Stars: ✭ 180 (-20.7%)
Mutual labels:  exploit
Hawkeye
Hawkeye filesystem analysis tool
Stars: ✭ 202 (-11.01%)
Mutual labels:  hacking
Cod Exploits
☠️ Call of Duty - Vulnerabilities and proof-of-concepts
Stars: ✭ 178 (-21.59%)
Mutual labels:  exploit
Capsulecorp Pentest
Vagrant VirtualBox environment for conducting an internal network penetration test
Stars: ✭ 214 (-5.73%)
Mutual labels:  hacking
Heapinspect
πŸ”Heap analysis tool for CTF pwn.
Stars: ✭ 177 (-22.03%)
Mutual labels:  exploit
Mad Metasploit
Metasploit custom modules, plugins, resource script and.. awesome metasploit collection
Stars: ✭ 200 (-11.89%)
Mutual labels:  hacking
Memject
Simple Dll injector loading from memory. Supports PE header and entry point erasure. Written in C99.
Stars: ✭ 176 (-22.47%)
Mutual labels:  hacking
Netelf
Run executables from memory, over the network, on Windows, Linux, OpenVMS... routers... spaceships... toasters etc.
Stars: ✭ 220 (-3.08%)
Mutual labels:  hacking
Hacktricks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Stars: ✭ 3,741 (+1548.02%)
Mutual labels:  hacking
Filevaultcracker
macOS FileVault cracking tool
Stars: ✭ 199 (-12.33%)
Mutual labels:  hacking
Djangohunter
Tool designed to help identify incorrectly configured Django applications that are exposing sensitive information.
Stars: ✭ 212 (-6.61%)
Mutual labels:  hacking
Raccoon
A high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+918.5%)
Mutual labels:  hacking
Cve 2019 9810
Exploit for CVE-2019-9810 Firefox on Windows 64-bit.
Stars: ✭ 200 (-11.89%)
Mutual labels:  exploit
Umbrella android
Open source Android, iOS and Web app for learning about and managing digital and physical security. From how to send a secure message to dealing with a kidnap. Umbrella has best practice guides in over 40 topics in multiple languages. Used daily by people working in high risk countries - journalists, activists, diplomats, business travelers etc.
Stars: ✭ 171 (-24.67%)
Mutual labels:  hacking
Remote Desktop Caching
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Stars: ✭ 171 (-24.67%)
Mutual labels:  hacking
Wesng
Windows Exploit Suggester - Next Generation
Stars: ✭ 2,675 (+1078.41%)
Mutual labels:  exploit
Technowlogger
TechNowLogger is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info
Stars: ✭ 172 (-24.23%)
Mutual labels:  hacking
Mobilehackersweapons
Mobile Hacker's Weapons / A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 170 (-25.11%)
Mutual labels:  hacking
Caldera
Automated Adversary Emulation Platform
Stars: ✭ 3,126 (+1277.09%)
Mutual labels:  hacking
Sitedorks
Search Google/Bing/Ecosia/DuckDuckGo/Yandex/Yahoo for a search term with a default set of websites, bug bounty programs or a custom collection.
Stars: ✭ 221 (-2.64%)
Mutual labels:  hacking
Buildapks
Really quickly build APKs on handheld device (smartphone or tablet) in Amazon, Android, Chromebook and WindowsπŸ“² See https://buildapks.github.io/docsBuildAPKs/setup to start building APKs.
Stars: ✭ 218 (-3.96%)
Mutual labels:  hacking
Brutedum
BruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack
Stars: ✭ 212 (-6.61%)
Mutual labels:  hacking
Trackerjacker
Like nmap for mapping wifi networks you're not connected to, plus device tracking
Stars: ✭ 2,307 (+916.3%)
Mutual labels:  hacking
Itrace
🍰 Trace objc method call for ios and mac
Stars: ✭ 170 (-25.11%)
Mutual labels:  hacking
Cehv10 Notes
πŸ“• Both personal and public notes for EC-Council's CEHv10 312-50, because its thousands of pages/slides of boredom, and a braindump to many
Stars: ✭ 170 (-25.11%)
Mutual labels:  hacking
Fdsploit
File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (-12.33%)
Mutual labels:  hacking
Attiny85
RubberDucky like payloads for DigiSpark Attiny85
Stars: ✭ 169 (-25.55%)
Mutual labels:  hacking
Activereign
A Network Enumeration and Attack Toolset for Windows Active Directory Environments.
Stars: ✭ 210 (-7.49%)
Mutual labels:  exploit
Ciscorv320dump
CVE-2019-1652 /CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!
Stars: ✭ 198 (-12.78%)
Mutual labels:  exploit
Bbrecon
Python library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-25.55%)
Mutual labels:  hacking
Discord Exploit Collection
A collection of Discord bugs and exploits
Stars: ✭ 166 (-26.87%)
Mutual labels:  exploit
Universalrop
Small tool for generating ropchains using unicorn and z3
Stars: ✭ 196 (-13.66%)
Mutual labels:  hacking
Dymerge
πŸ”“ A dynamic dictionary merger for successful dictionary based attacks.
Stars: ✭ 167 (-26.43%)
Mutual labels:  hacking
Expdevbadchars
Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.
Stars: ✭ 167 (-26.43%)
Mutual labels:  exploit
Goat
🐐 GoAT (Golang Advanced Trojan) is a trojan that uses Twitter as a C&C server
Stars: ✭ 218 (-3.96%)
Mutual labels:  hacking
Pentest Tools Framework
Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
Stars: ✭ 211 (-7.05%)
Mutual labels:  exploit
Ironsquirrel
Encrypted exploit delivery for the masses
Stars: ✭ 197 (-13.22%)
Mutual labels:  exploit
Aboutsecurity
A list of payload and bypass lists for penetration testing and red team infrastructure build.
Stars: ✭ 166 (-26.87%)
Mutual labels:  hacking
Uac exploit
Escalate as Administrator bypassing the UAC affecting administrator accounts only.
Stars: ✭ 165 (-27.31%)
Mutual labels:  exploit
Asu
facebook hacking toolkit
Stars: ✭ 197 (-13.22%)
Mutual labels:  hacking
Hydrafw
HydraFW official firmware for HydraBus/HydraNFC for researcher, hackers, students, embedded software developers or anyone interested in debugging/hacking/developing/penetration testing
Stars: ✭ 165 (-27.31%)
Mutual labels:  hacking
Ctf
some experience in CTFs
Stars: ✭ 165 (-27.31%)
Mutual labels:  exploit
T Load
New Interface And Loading Screen For Termux Users
Stars: ✭ 207 (-8.81%)
Mutual labels:  hacking
Awesome Windows Security
List of Awesome Windows Security Resources
Stars: ✭ 196 (-13.66%)
Mutual labels:  hacking
Ip Attack
Auto IP or Domain Attack Tool ( #1 )
Stars: ✭ 162 (-28.63%)
Mutual labels:  hacking
Lazybee
Create Best Wordlist From Python Tool In Termux
Stars: ✭ 161 (-29.07%)
Mutual labels:  hacking
Mosint
An automated e-mail OSINT tool
Stars: ✭ 184 (-18.94%)
Mutual labels:  hacking
61-120 of 831 similar projects