J4FSec / Research_PapersLinks
☆17Updated 4 years ago
Alternatives and similar repositories for Research_Papers
Users that are interested in Research_Papers are comparing it to the libraries listed below
Sorting:
- Bypassing File Upload Restriction using Magic Bytes☆22Updated 3 years ago
- A Case Study in Bypassing Client-Side Anti-Fraud Mechanisms☆68Updated last week
- Meterpreter Reverse shell over TOR network using hidden services☆87Updated 4 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆33Updated 3 years ago
- ☆24Updated last year
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆45Updated 3 months ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆33Updated 3 years ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆165Updated 2 years ago
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Updated 2 years ago
- 🍳 The most delicious pentesting tool☆45Updated 4 years ago
- A proof of concept email spoofing tool built on Docker.☆129Updated 4 years ago
- Crappy Golang code to list local listening ports and their associated processes.☆34Updated 2 years ago
- Python TCP server for terminal rickrolls☆13Updated 4 years ago
- A tool to dump exposed .git repositories☆75Updated 8 months ago
- A targeted DNS cache poisoner☆124Updated 3 years ago
- Classic Web shell upload techniques & Web RCE techniques☆61Updated 4 months ago
- ☆23Updated 5 years ago
- ☆69Updated 4 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆48Updated 4 years ago
- A powerful and delightful PHP WebShell☆67Updated 11 months ago
- Custom rules by cyclone☆16Updated last month
- Rodan Exploitation Framework☆103Updated 2 months ago
- Purpose-built Red Team network hardware implant made from common components.☆25Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Updated 2 years ago
- CATANA - CUT your Wordlist!☆15Updated 3 years ago
- CTF toolbox☆22Updated 2 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆178Updated last week
- Python3 script to dump breach data from Dehashed☆42Updated 7 months ago
- Zero-Day Code Injection and Persistence Technique☆35Updated 8 years ago