Raw Packet Injection tool
☆241Aug 26, 2020Updated 5 years ago
Alternatives and similar repositories for Pinject
Users that are interested in Pinject are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Simple network sniffer implemented on Python 3☆74Jun 29, 2020Updated 5 years ago
- Simple Asynchronous HTTP Proxy written in python☆48Jul 12, 2014Updated 11 years ago
- DDoS Amplification Tool☆1,014Apr 25, 2023Updated 2 years ago
- Hidemyass Proxy Grabber☆89Mar 25, 2017Updated 9 years ago
- Nscan: Fast internet-wide scanner☆535Feb 23, 2015Updated 11 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- open source DDoS Amplification Tool with scanners.☆48Jun 1, 2017Updated 8 years ago
- Attack script and scanner for DNS based spoofed amplification attacks.☆20Oct 16, 2016Updated 9 years ago
- A firefox profile for web security enthusiasts (Supposed to be configured with woobuntu )☆10Jul 6, 2016Updated 9 years ago
- ☆56Jul 20, 2017Updated 8 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Sep 18, 2017Updated 8 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- ☆14May 12, 2021Updated 4 years ago
- ☆197Sep 27, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- an autodialer written in nodejs using the twilio api (not functional)☆11Mar 8, 2015Updated 11 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 12 years ago
- Organizador básico de arquivos. Organiza seus arquivos em determinadas pastas de acordo com o tipo do arquivo: Documentos de texto (txt, …☆15May 22, 2018Updated 7 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Powershell to CodeExecution and ProcessInjection☆65Jul 18, 2017Updated 8 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- Gathering Email Information Tool☆38Mar 1, 2017Updated 9 years ago
- Database of GMod backdoors & how to protect your servers from them.☆10Jun 20, 2016Updated 9 years ago
- PoC exploit for CVE-2015-5477 BIND9 TKEY assertion failure☆65Aug 1, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Uses InstallUtil.exe to load a compatible executable from a network share.☆12Mar 8, 2016Updated 10 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Feb 6, 2017Updated 9 years ago
- Zero-Day Code Injection and Persistence Technique☆35Mar 28, 2017Updated 9 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- NSA finest tool☆33Apr 27, 2017Updated 8 years ago
- ☆13Jan 26, 2024Updated 2 years ago
- external weapon id dumper☆18May 4, 2019Updated 6 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆30Oct 27, 2013Updated 12 years ago
- A sleek remote administration tool☆12Jan 30, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This repository has a internal model changer with FindMDL Hook for Counter-Strike: Global Offensive game. It's fully open source and load…☆12Apr 11, 2025Updated 11 months ago
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago
- MS15-076 Privilege Escalation☆101Sep 21, 2015Updated 10 years ago
- Detect some forms of linux kernel tampering☆12Jun 12, 2015Updated 10 years ago
- The state of the art, modular, portable and easily extensible MITM framework in a Docker Container.☆14Dec 30, 2017Updated 8 years ago
- Make changes to A2S_INFO and A2S_PLAYER packets being sent from your GMod server☆17Feb 14, 2019Updated 7 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆98Oct 3, 2012Updated 13 years ago