☆55Jul 20, 2017Updated 8 years ago
Alternatives and similar repositories for Shellcodes
Users that are interested in Shellcodes are comparing it to the libraries listed below
Sorting:
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Feb 6, 2016Updated 10 years ago
- Thanos is a tool made for scan a range of IP's and get the banners of the running services. The main function is do banner grabber, but y…☆46Jul 2, 2016Updated 9 years ago
- injecting arbitrary codes in memory to bypass common antivirus solutions☆171Jul 20, 2017Updated 8 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆565Aug 17, 2020Updated 5 years ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- This is a fuzzer for automated web application scanners and vulnerability scanners. The idea is to send an unexpectedly large response to…☆24Oct 11, 2015Updated 10 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 10 years ago
- D-RAT SRC Extract☆13Dec 24, 2016Updated 9 years ago
- Miscellaneous analysis tools☆25Mar 3, 2015Updated 11 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Mar 8, 2017Updated 9 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- A PowerShell binding for the Unicorn Engine☆17Dec 27, 2015Updated 10 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆59Oct 10, 2015Updated 10 years ago
- Raptor - Web application firewall [ Stable ]☆15Dec 8, 2016Updated 9 years ago
- Check arbitrary file download vulnerability in the WordPress☆23Feb 21, 2020Updated 6 years ago
- bash script to enumerate vulnerabilities on specific year through Shodan API☆46Dec 5, 2018Updated 7 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Jul 2, 2021Updated 4 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Aug 18, 2016Updated 9 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- DRDoS UDP amplification tool☆17Jul 2, 2015Updated 10 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Mar 9, 2016Updated 10 years ago
- Differential Analysis of Malware in Memory☆216Apr 16, 2017Updated 8 years ago
- Collecting data from the state of UDP buffers☆14Jan 30, 2017Updated 9 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- Web based code browser using clang to provide basic code analysis.☆46Jul 20, 2017Updated 8 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago