DonnchaC / desktop-file-social-engineering
Desktop shortcuts (.desktop) create a risk for code execution via social engineering
☆10Updated 8 years ago
Alternatives and similar repositories for desktop-file-social-engineering:
Users that are interested in desktop-file-social-engineering are comparing it to the libraries listed below
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 9 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- ☆15Updated 8 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 8 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- ☆27Updated 7 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆25Updated 9 years ago
- ☆12Updated 8 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- Extract useful information from a Twitter account.☆34Updated 11 years ago
- ☆17Updated 9 years ago
- Find useful stuff in pastebin☆23Updated 12 years ago
- Some yara rules and tools☆16Updated 11 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- python tor client☆27Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Searches for interesting cached DNS entries.☆55Updated 10 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16Updated 11 years ago