ParrotSec / hexinject
HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.
☆21Updated 7 years ago
Alternatives and similar repositories for hexinject:
Users that are interested in hexinject are comparing it to the libraries listed below
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Wardriving ekoparty☆14Updated 7 years ago
- flood area with fake essids☆21Updated 7 years ago
- Wi-Fi Backdoors☆38Updated 9 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆18Updated 8 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- Password cracking utility☆53Updated 3 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆35Updated 11 years ago
- AES encrypted python backdoor that communicates AES encrypted data☆9Updated 10 years ago
- ssh session type for metasploit☆98Updated 2 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 3 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- Scripts and tools for ISM hacking☆15Updated 7 years ago
- ☆24Updated 6 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- ☆26Updated 8 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- See here:☆42Updated 12 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Updated 5 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆21Updated 9 years ago
- (◍•﹏•) - Hi, I'm Eve☆21Updated 6 years ago