Skip to content
View vansh712's full-sized avatar

Block or report vansh712

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 / CVE-2018-7600 / SA-CORE-2018-002)

Ruby 574 174 Updated Jan 8, 2021

Cybercrime forums for Cyber Threat Intelligence purpose

71 22 Updated Sep 25, 2019

Powerfull Automatic Sql injection Tools Pack

Shell 106 41 Updated Aug 10, 2021

WEB SQLi Injection DB Dumper DATA Hacking Tool

PHP 53 57 Updated Oct 1, 2019

🔨 List all IP ranges from: Google (Cloud & GoogleBot), Bing (Bingbot), Amazon (AWS), Microsoft, Oracle (Cloud), GitHub, Facebook (Meta), OpenAI (GPTBot) and other with daily updates.

Shell 554 93 Updated Sep 7, 2024

Scripts for Network Pentesting

Shell 10 Updated May 3, 2023

A Python Program that uses psycopg2 module to brute force PostgreSQL Server

Python 1 Updated Sep 7, 2024

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…

PHP 56,747 23,698 Updated Sep 7, 2024

WannaCry decompiled source code

C 63 14 Updated Dec 5, 2022

BaseQuery is an OSINT tool used import email and password data files from security breaches, storing them in a way that is extremely quick to search through

Python 11 29 Updated Feb 9, 2019

BreachCheck is a tool designed to help users search for their passwords in known data breaches and leaks.

Python 11 3 Updated Jul 27, 2024

Search breached data on private nodes, darkweb, internet, end-to-end channels

Python 71 26 Updated Nov 27, 2019

Ethereum Address Wallet Generated With Private Key From Mnemonic and check Value (Balance , transaction) Without API

Python 122 51 Updated May 21, 2024

Generates random wallets and checks.

Python 2 2 Updated Apr 30, 2023

A fun script to steal Ether from wallets suffering from insufficient entropy during key generation.

Python 57 19 Updated Dec 8, 2023

A collection of source code for various botnets.

C 545 139 Updated Oct 9, 2019

CondiV6 SourceCode Leaked by t.me/iotbotnets Thanks for the leak!

C 11 3 Updated Oct 11, 2023

All about DDoS attacks, exploits, botnets and some proxies =)

JavaScript 77 32 Updated Jan 17, 2024

This is a HidakiNetworks botnet source (first version with old methods). Hidaki botnet is a rewritten mortem qbot. Use this sources only for educational purposes!!

C 12 2 Updated Apr 30, 2024

Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods

Python 12,489 2,602 Updated Jun 26, 2024

The source code of main tools used in Bitcoin "non-malware-based" attacks.

C 472 196 Updated Jun 8, 2024

A simple library to recover the private key of ECDSA and DSA signatures sharing the same nonce k and therefore having identical signature parameter r

Python 401 122 Updated Feb 16, 2022

A proof-of-concept cracker for cryptocurrency brainwallets and other low entropy key algorithms.

C 897 460 Updated May 16, 2024

XSS Worm which steals victim's cookies and some information also spread others. Written in js, php and java.

PHP 10 7 Updated Dec 12, 2017

A command line tool to automate scanning for vulnerable smb hosts and exploit (Conficker worm) using metasploit and python.

Python 6 1 Updated Nov 2, 2018

A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines

Python 28 9 Updated Sep 28, 2015

Self Spreading PowerShell Worm That Recovers System Info & Browser Data

PowerShell 10 2 Updated Jul 14, 2023

EternalRocks worm

449 147 Updated May 25, 2017

SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.

Shell 1,939 189 Updated Jul 25, 2024

A framework for constructing self-spreading binaries

Go 994 102 Updated Nov 23, 2023
Next