Persistent bind shell via pythonic shellcode execution, and registry tampering.
☆22Dec 1, 2017Updated 8 years ago
Alternatives and similar repositories for Shellware
Users that are interested in Shellware are comparing it to the libraries listed below
Sorting:
- A fully featured backdoor that uses Gmail as a C&C server☆19Oct 13, 2015Updated 10 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- Learning-Pentesting-With-Python☆18Sep 26, 2018Updated 7 years ago
- Multi source CVE/exploit parser.☆27Aug 30, 2017Updated 8 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- Golang tool to scan hosts for SMB version and signing status☆15Nov 19, 2024Updated last year
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 11 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 11 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 5 years ago
- Python script to exploit confluence path traversal vulnerability cve-2019-3398☆15Jun 6, 2019Updated 6 years ago
- A network analysis algorithm for detecting bots on large networks.☆20Apr 15, 2013Updated 12 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- ☆15Jan 21, 2020Updated 6 years ago
- Academic project implementing basic first-hop LAN attacks such as DHCP starvation, ARP spoofing, DNS poisoning and more.☆18May 14, 2020Updated 5 years ago
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Sep 18, 2017Updated 8 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 7 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆167Aug 23, 2019Updated 6 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Jan 6, 2020Updated 6 years ago
- Raspberry Pi 2+ MouseJack port for SPI connected NRF24 modules.☆22Sep 27, 2016Updated 9 years ago
- BitTorrent Tracker with upload & browsing, written on the 25th Chaos Communication Congress☆33Dec 25, 2013Updated 12 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Aug 2, 2016Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)☆11Updated this week
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- Remote shell/exfiltration using keyboard leds.☆26Jul 27, 2017Updated 8 years ago
- Several self-defense shellcodes☆23Jul 16, 2019Updated 6 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆81Mar 7, 2018Updated 7 years ago
- Python network tool, similar to Netcat with custom features.☆197May 31, 2017Updated 8 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Nov 15, 2019Updated 6 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Jul 10, 2017Updated 8 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Sep 14, 2017Updated 8 years ago
- LOKI (Limited Obstructive Keyboard Impersonator) is a RDP File Transfer Tool Using Keypresses☆63Mar 11, 2016Updated 9 years ago
- ☆12May 13, 2020Updated 5 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- Port scanning and domain utility.☆29Sep 8, 2017Updated 8 years ago
- Deploy payloads to *Nix systems en masse☆108Apr 24, 2020Updated 5 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Apr 14, 2017Updated 8 years ago
- Pythonic ransomware proof of concept.☆219May 12, 2020Updated 5 years ago