Linux RDP Scanner and Bruteforcer Scripts
☆59Aug 31, 2015Updated 10 years ago
Alternatives and similar repositories for Linux-RDP
Users that are interested in Linux-RDP are comparing it to the libraries listed below
Sorting:
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆84May 9, 2014Updated 11 years ago
- For the analysis of CVE-2013-2028☆30Jun 7, 2018Updated 7 years ago
- General Scripts to help with various types of SQL Injection☆31Jan 31, 2014Updated 12 years ago
- ☆14Sep 20, 2014Updated 11 years ago
- Board layout☆13Jul 1, 2015Updated 10 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- PHP Frontend to work with the SQLMAP JSON API Server (sqlmapapi.py) to allow for a Web GUI to drive near full functionality of SQLMAP!☆325Aug 31, 2015Updated 10 years ago
- SpyEye v1.3 bug exploiter (frm_findftp_sub.php)☆19Sep 19, 2018Updated 7 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- Power Loader botnet☆40Feb 25, 2015Updated 11 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Feb 6, 2016Updated 10 years ago
- EternalBlue/DoublePulsar python wrapper☆10Nov 22, 2017Updated 8 years ago
- melter library for Win32 PE files☆18Jul 6, 2015Updated 10 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- RIG Exploit Kit (front end)☆30Feb 25, 2015Updated 11 years ago
- network message encapsulation library☆32Mar 11, 2026Updated last week
- Simple C# reverse shell with shellcode and process injection☆39May 13, 2016Updated 9 years ago
- Yet Another SMB PSEXEC (Y.A.S.P) Tool☆22Nov 2, 2013Updated 12 years ago
- Infecting PE☆25Mar 10, 2014Updated 12 years ago
- Python tool to brute force MikroTik login page☆14Oct 31, 2025Updated 4 months ago
- ☆78May 24, 2018Updated 7 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆31Aug 2, 2013Updated 12 years ago
- Backdoor implementation in Ruby (testing)☆30Jul 6, 2015Updated 10 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆300May 5, 2016Updated 9 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- DRDoS UDP amplification tool☆17Jul 2, 2015Updated 10 years ago
- A management UI for MikroTik Routers based onto Django☆13Dec 16, 2019Updated 6 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- Dexter v2 - Point of Sales Trojan☆26Feb 25, 2015Updated 11 years ago
- Spoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug☆86Mar 27, 2019Updated 6 years ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆69May 7, 2016Updated 9 years ago