DiabloHorn / qiba_pocView external linksLinks
Quantum Insert Backdoor POC
☆11May 21, 2017Updated 8 years ago
Alternatives and similar repositories for qiba_poc
Users that are interested in qiba_poc are comparing it to the libraries listed below
Sorting:
- ☆15Nov 29, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/checkout4mac☆13Oct 24, 2016Updated 9 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Dec 19, 2018Updated 7 years ago
- Use to generate DLL through Visual Studio☆20Jul 24, 2017Updated 8 years ago
- Set of ultra technical notes about AD☆18Jun 17, 2018Updated 7 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- ☆28Apr 1, 2018Updated 7 years ago
- NetSPI HTTP Scrapers☆29Jul 9, 2019Updated 6 years ago
- integrating bro into yara☆33Dec 9, 2014Updated 11 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- Remote Windows shell☆32Jun 22, 2014Updated 11 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Sep 21, 2017Updated 8 years ago
- PhishSticks: A project made for the course "Infra Project 2023" at Haaga-Helia. Creating tools for ethical pentesting by making a simul…☆10Dec 12, 2023Updated 2 years ago
- ☆35Nov 4, 2017Updated 8 years ago
- A CSP for the OpenPGP card - goal: add write support for certificate enrollment☆43Jan 4, 2026Updated last month
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Create a netfilter queue and display packets passing through. Can also save those packets to a pcap file.☆13Dec 3, 2011Updated 14 years ago
- ☆12May 30, 2019Updated 6 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- making printf work for you☆15Nov 10, 2025Updated 3 months ago
- Companion to the RiotJS Style Guide.☆10May 23, 2016Updated 9 years ago
- Baidu 100G Chasiss Switch hardware spec☆12Sep 20, 2017Updated 8 years ago
- Software Exploitation☆11Sep 22, 2025Updated 4 months ago
- Python script to send SMS using Huawei new[er] USB dongles via the HTTP interface☆11Jul 10, 2017Updated 8 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Jun 14, 2018Updated 7 years ago
- MongoDB Login Brute Forcer☆11Jun 22, 2014Updated 11 years ago
- Automatially unzip files added to a specified directory☆13Mar 12, 2022Updated 3 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- All about the remote administrative tools☆37Jul 29, 2015Updated 10 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- ☆45Nov 5, 2018Updated 7 years ago
- powershell tool for VM evasion☆41Oct 2, 2020Updated 5 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Feb 13, 2017Updated 9 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Nov 30, 2020Updated 5 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- A python script to automatically dump files and source code of a Symfony server in debug mode.☆13Feb 11, 2025Updated last year
- Volumetric Development☆11Mar 19, 2024Updated last year