☆55Jul 20, 2017Updated 8 years ago
Alternatives and similar repositories for Shellcodes
Users that are interested in Shellcodes are comparing it to the libraries listed below
Sorting:
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- Thanos is a tool made for scan a range of IP's and get the banners of the running services. The main function is do banner grabber, but y…☆46Jul 2, 2016Updated 9 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Feb 6, 2016Updated 10 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- injecting arbitrary codes in memory to bypass common antivirus solutions☆170Jul 20, 2017Updated 8 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- This is a fuzzer for automated web application scanners and vulnerability scanners. The idea is to send an unexpectedly large response to…☆24Oct 11, 2015Updated 10 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆11Oct 10, 2015Updated 10 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- D-RAT SRC Extract☆12Dec 24, 2016Updated 9 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆59Oct 10, 2015Updated 10 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Mar 8, 2017Updated 8 years ago
- Miscellaneous analysis tools☆25Mar 3, 2015Updated 10 years ago
- bash script to enumerate vulnerabilities on specific year through Shodan API☆46Dec 5, 2018Updated 7 years ago
- DRDoS UDP amplification tool☆17Jul 2, 2015Updated 10 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆562Aug 17, 2020Updated 5 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Aug 18, 2016Updated 9 years ago
- A PowerShell binding for the Unicorn Engine☆17Dec 27, 2015Updated 10 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- Slides from presentations done by ESET researchers☆20Dec 18, 2015Updated 10 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Mar 9, 2016Updated 9 years ago
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆109Apr 13, 2016Updated 9 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- Reverse-engineering tools for Android applications☆56Aug 2, 2011Updated 14 years ago
- Educational repository for learning about rootkits and Windows Kernel Hooks.☆49Mar 21, 2015Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- async web crawler☆31Jun 13, 2014Updated 11 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- Wi-Fi Backdoors☆42Aug 5, 2015Updated 10 years ago