mOrc is a post-exploitation framework for macOS written in Bash
☆19Apr 19, 2023Updated 2 years ago
Alternatives and similar repositories for mOrc
Users that are interested in mOrc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Jan 6, 2020Updated 6 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- a exec jsp shell, simply like weevely php C/S shell.☆14Jun 21, 2022Updated 3 years ago
- XXE attack tool☆31Feb 20, 2016Updated 10 years ago
- SECD machine and Lispkit Lisp compiler, in Python☆10Oct 25, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Jul 12, 2016Updated 9 years ago
- ☆12Oct 27, 2017Updated 8 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Jun 25, 2018Updated 7 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 8 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Apr 14, 2015Updated 10 years ago
- ☆16May 22, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Work-in-progress Dissent port/rewrite for low-latency anonymous communication☆11Jul 13, 2018Updated 7 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆402Nov 12, 2019Updated 6 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- VNC pentest tool with bruteforce and ducky script execution features☆24Nov 18, 2017Updated 8 years ago
- Project for the Crypto subject at Uni☆18Dec 26, 2016Updated 9 years ago
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- (harmless) mirai botnet client☆14Dec 29, 2016Updated 9 years ago
- Port scanning and domain utility.☆30Sep 8, 2017Updated 8 years ago
- Packer for PE and ELF, 32 and 64bits.☆22Aug 5, 2013Updated 12 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆13Feb 8, 2019Updated 7 years ago
- A Python PoC for CVE-2018-9206☆13Oct 22, 2018Updated 7 years ago
- A debugger in Python for Cisco c3560☆10Apr 24, 2018Updated 7 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Dec 10, 2015Updated 10 years ago
- A series of attack tests on commonly used libraries and contracts in the ethereum web space☆19May 6, 2018Updated 7 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- We store attacks and exploits that we've found useful in our research☆13Jun 4, 2015Updated 10 years ago
- LD_PRELOAD rootkit utils☆16Jul 3, 2015Updated 10 years ago
- Experiment with Linux system calls (memfd_create, fexecve, fork...)☆24Apr 12, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- SSH Based Remote Administration Tool☆103Jul 9, 2015Updated 10 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Aug 6, 2016Updated 9 years ago
- A modular pentesting framework implemented in C☆13Aug 6, 2018Updated 7 years ago
- Static Php Analysis and Fuzzer☆26Apr 22, 2014Updated 11 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- cms识别☆13Dec 2, 2017Updated 8 years ago
- iknowthis Linux SystemCall Fuzzer☆20Apr 18, 2019Updated 6 years ago