Linux RDP Scanner and Bruteforcer Scripts
☆59Aug 31, 2015Updated 10 years ago
Alternatives and similar repositories for Linux-RDP
Users that are interested in Linux-RDP are comparing it to the libraries listed below
Sorting:
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆84May 9, 2014Updated 11 years ago
- General Scripts to help with various types of SQL Injection☆30Jan 31, 2014Updated 12 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- ☆14Sep 20, 2014Updated 11 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- Simple C# reverse shell with shellcode and process injection☆39May 13, 2016Updated 9 years ago
- DRDoS UDP amplification tool☆17Jul 2, 2015Updated 10 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆31Aug 2, 2013Updated 12 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Feb 6, 2016Updated 10 years ago
- ☆78May 24, 2018Updated 7 years ago
- Infecting PE☆25Mar 10, 2014Updated 11 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆69May 7, 2016Updated 9 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆300May 5, 2016Updated 9 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Nov 12, 2014Updated 11 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- PHP Frontend to work with the SQLMAP JSON API Server (sqlmapapi.py) to allow for a Web GUI to drive near full functionality of SQLMAP!☆325Aug 31, 2015Updated 10 years ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- python inspect rootkit tool☆33Oct 17, 2013Updated 12 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- This is a fuzzer for automated web application scanners and vulnerability scanners. The idea is to send an unexpectedly large response to…☆24Oct 11, 2015Updated 10 years ago
- melter library for Win32 PE files☆18Jul 6, 2015Updated 10 years ago
- Python tools for interacting with a DarkComet Client☆54Aug 4, 2015Updated 10 years ago
- Crackhash is a tool that try to crack different types of hashes using free online services.☆25Oct 29, 2019Updated 6 years ago
- Yet Another SMB PSEXEC (Y.A.S.P) Tool☆22Nov 2, 2013Updated 12 years ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- EternalBlue/DoublePulsar python wrapper☆10Nov 22, 2017Updated 8 years ago
- Library for Object Linking and Embedding (OLE) data types☆12Nov 27, 2025Updated 3 months ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- Network aware keylogger: broadcasting on your local area network.☆22Jul 29, 2013Updated 12 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Mar 8, 2017Updated 8 years ago