Introbackdoors
☆50Mar 17, 2017Updated 9 years ago
Alternatives and similar repositories for Introtobackdoors
Users that are interested in Introtobackdoors are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Transfer Kippo data to ElasticSearch☆18Dec 14, 2015Updated 10 years ago
- Test Suite for John the Ripper☆26Dec 28, 2025Updated 3 months ago
- Outlook addin Back Door☆11Dec 2, 2015Updated 10 years ago
- ☆12Dec 16, 2016Updated 9 years ago
- Unofficial Kali Documentation Project☆160Feb 27, 2015Updated 11 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Attack Knowledge Base☆101Jul 5, 2017Updated 8 years ago
- Decompile .Net code in Powershell☆13Sep 21, 2015Updated 10 years ago
- Challenge files which are deployed in the container for the user☆25May 24, 2024Updated last year
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Oct 21, 2014Updated 11 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Pentesting Tools☆22Sep 15, 2025Updated 6 months ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- ☆40Feb 23, 2016Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Run Managed Assemblies with RunDll☆17Jul 2, 2018Updated 7 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Sep 9, 2022Updated 3 years ago
- Square inch Arduino board.☆17Aug 8, 2012Updated 13 years ago
- a mass web screenshot tool for mapping web networks.☆24Apr 16, 2015Updated 10 years ago
- F.Security Framwork☆20Jul 10, 2016Updated 9 years ago
- ☆86Aug 11, 2023Updated 2 years ago
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- A recursively templating configuration source for Microsoft.Extensions.Configuration☆16Nov 20, 2018Updated 7 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Social Engineering Abusing Google App Scripts☆24Jan 13, 2026Updated 2 months ago
- Creates a changelog from git log history.☆10Mar 27, 2026Updated 2 weeks ago
- ☆80Sep 27, 2015Updated 10 years ago
- Client/server scripts designed to test outbound (egress) firewall rules.☆37Sep 9, 2013Updated 12 years ago
- Lansweeper Password Recovery Tool☆11Jul 2, 2016Updated 9 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- IP Address Listing Tool☆12Sep 1, 2013Updated 12 years ago
- Script to check Kali Linux configs☆25Jan 14, 2019Updated 7 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Aug 10, 2013Updated 12 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- The challenge writeups and solutions for yookiterm-challenge-files☆37Jan 30, 2023Updated 3 years ago
- ☆21Apr 15, 2016Updated 9 years ago
- CVE-2021-26084 - Confluence Pre-Auth RCE | OGNL injection☆21Sep 1, 2021Updated 4 years ago
- Advanced XPath Injection Tool☆33Jan 29, 2026Updated 2 months ago
- Play 2048 in notepad.exe☆13Feb 16, 2015Updated 11 years ago
- Security tools to use on assessments.☆40May 9, 2016Updated 9 years ago
- A webshell connection tool with customized WAF bypass payloads☆125Sep 12, 2018Updated 7 years ago