DC801 / IntrotobackdoorsView external linksLinks
Introbackdoors
☆50Mar 17, 2017Updated 8 years ago
Alternatives and similar repositories for Introtobackdoors
Users that are interested in Introtobackdoors are comparing it to the libraries listed below
Sorting:
- Decompile .Net code in Powershell☆13Sep 21, 2015Updated 10 years ago
- Transfer Kippo data to ElasticSearch☆18Dec 14, 2015Updated 10 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Oct 21, 2014Updated 11 years ago
- Outlook addin Back Door☆11Dec 2, 2015Updated 10 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWA…☆18Feb 22, 2017Updated 8 years ago
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- Run Managed Assemblies with RunDll☆17Jul 2, 2018Updated 7 years ago
- Security related useful Powershell scripts☆19Sep 13, 2019Updated 6 years ago
- ☆80Sep 27, 2015Updated 10 years ago
- Unofficial Kali Documentation Project☆159Feb 27, 2015Updated 10 years ago
- ☆22Jan 26, 2015Updated 11 years ago
- ☆86Aug 11, 2023Updated 2 years ago
- Pentesting Tools☆22Sep 15, 2025Updated 4 months ago
- ☆21Apr 15, 2016Updated 9 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Aug 10, 2013Updated 12 years ago
- a mass web screenshot tool for mapping web networks.☆24Apr 16, 2015Updated 10 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Social Engineering Abusing Google App Scripts☆24Jan 13, 2026Updated last month
- Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.☆22Jun 26, 2022Updated 3 years ago
- Attack Knowledge Base☆101Jul 5, 2017Updated 8 years ago
- Encode powershell payload into bat files☆155Feb 1, 2018Updated 8 years ago
- ☆43Sep 2, 2016Updated 9 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- Client/server scripts designed to test outbound (egress) firewall rules.☆37Sep 9, 2013Updated 12 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆121Aug 18, 2020Updated 5 years ago
- A practical tool for bytecode manipulation and creating Managed Code Rootkits (MCRs) in the Java Runtime Environment☆58Jan 19, 2020Updated 6 years ago
- python library for dumping a linux process from memory☆34Jun 15, 2010Updated 15 years ago
- ☆40Feb 23, 2016Updated 9 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- A framework for interacting with HCL AppScan on Cloud and HCL AppScan Enterprise☆12Mar 3, 2023Updated 2 years ago
- ☆36Aug 7, 2021Updated 4 years ago
- Python Script for Spamming Emails with Attachments☆10Jan 4, 2020Updated 6 years ago
- ☆33Apr 20, 2022Updated 3 years ago
- A PoC WMI backdoor presented at Black Hat 2015☆275Aug 10, 2015Updated 10 years ago
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆208Jan 24, 2016Updated 10 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆156Apr 22, 2015Updated 10 years ago