J4FSec / Research_PapersLinks
☆17Updated 3 years ago
Alternatives and similar repositories for Research_Papers
Users that are interested in Research_Papers are comparing it to the libraries listed below
Sorting:
- Bypassing File Upload Restriction using Magic Bytes☆21Updated 3 years ago
- Classic Web shell upload techniques & Web RCE techniques☆49Updated last month
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆32Updated 2 years ago
- CATANA - CUT your Wordlist!☆15Updated 3 years ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
- Python TCP server for terminal rickrolls☆13Updated 3 years ago
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆47Updated 3 weeks ago
- Purpose-built Red Team network hardware implant made from common components.☆26Updated 2 years ago
- Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shells…☆20Updated 2 years ago
- ☆33Updated 2 years ago
- CTF toolbox☆22Updated 2 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- Command line client for HackTheBox☆23Updated last year
- Crappy Golang code to list local listening ports and their associated processes.☆32Updated 2 years ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆163Updated last year
- This repository contains a few leaked files of HookBot.☆106Updated 2 years ago
- A tool to dump exposed .git repositories☆72Updated 5 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Updated last year
- A proof of concept email spoofing tool built on Docker.☆129Updated 4 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆27Updated 7 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆49Updated 4 years ago
- A powerful and delightful PHP WebShell☆67Updated 9 months ago
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 4 years ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆21Updated last year
- Windows And Ways To Break It☆101Updated 2 years ago
- A look into Google's JavaScript Clientside Security☆65Updated last month
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆16Updated last year
- Google Chrome Cookies Stealer. Steals Chrome cookies☆47Updated 2 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆32Updated 3 years ago