Script to silently intercept SSL on computers infected with Superfish malware
☆28Feb 20, 2015Updated 11 years ago
Alternatives and similar repositories for Superphish
Users that are interested in Superphish are comparing it to the libraries listed below
Sorting:
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 6 years ago
- My dotfiles stash☆14Dec 14, 2025Updated 2 months ago
- Run Managed Assemblies with RunDll☆17Jul 2, 2018Updated 7 years ago
- Uses AES to run encrypted shellcode using Python and ctypes☆15Jan 17, 2016Updated 10 years ago
- A simple example of dropping a PHP backdoor on a pfSense firewall over xmlrpc.php☆20Apr 16, 2015Updated 10 years ago
- Power Loader botnet☆40Feb 25, 2015Updated 11 years ago
- Static Php Analysis and Fuzzer☆26Apr 22, 2014Updated 11 years ago
- Small Linux command-line tool to "ping" 802.11 devices☆28Aug 29, 2012Updated 13 years ago
- A mirror of "103_top_shell.rar" since the original disappeared.☆25Sep 27, 2015Updated 10 years ago
- find public zombie hosts for idle scanning, using shodan search and nmap☆24Feb 13, 2015Updated 11 years ago
- The Ukr-Books-ChatGPT-Plugin is a Python-based plugin designed to enhance the capabilities of OpenAI's ChatGPT model by integrating it wi…☆19Jul 21, 2023Updated 2 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Mar 31, 2014Updated 11 years ago
- A security scanner for Wordpress blogging engine☆32May 11, 2016Updated 9 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Jan 8, 2019Updated 7 years ago
- Microsoft Windows HTA (HTML Application) - Remote Code Execution☆30Aug 21, 2015Updated 10 years ago
- Playing around with token manipulation in C#.☆29Nov 6, 2019Updated 6 years ago
- The HPE Alletra 9000 and Primera and 3PAR PowerShell Toolkit supports cmdlets, which are wrappers around the native HPE Alletra 9000 or H…☆12Dec 21, 2022Updated 3 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- Panic button for protection against cold boot attacks☆146Feb 7, 2022Updated 4 years ago
- A URL Shortner☆10Jul 11, 2015Updated 10 years ago
- 🚀 RocketAPI PHP SDK for Instagram & Threads Private API 2025☆13Apr 22, 2025Updated 10 months ago
- ☆32Aug 9, 2019Updated 6 years ago
- ☆10Feb 19, 2023Updated 3 years ago
- A simple network stress test tool.☆14Feb 24, 2024Updated 2 years ago
- Create VCF file from exported Telegram data☆11May 21, 2019Updated 6 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- penetration testing framework that can use socks4/socks5 proxy.☆53Sep 6, 2014Updated 11 years ago
- MCFI/PICFI tool chain☆45Mar 21, 2024Updated last year
- ☆12Jul 7, 2014Updated 11 years ago
- A pure Perl HTTP proxy☆19May 14, 2020Updated 5 years ago
- Website for PlayCover☆12Updated this week
- Wireguard Key Generator, web-based, client-side, trustless☆13Feb 3, 2025Updated last year
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Integration of fluent-bit and Splunk using the HTTP Event Collector (Splunk HEC)☆10Oct 16, 2018Updated 7 years ago
- How to install macOS Big Sur on an Unsupported Mac : Example: MacBook Pro Late 2011☆10Feb 27, 2021Updated 5 years ago
- ☆11Mar 13, 2012Updated 13 years ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- ☆13Jul 29, 2024Updated last year