A modular pentesting framework implemented in C
☆13Aug 6, 2018Updated 7 years ago
Alternatives and similar repositories for PPF
Users that are interested in PPF are comparing it to the libraries listed below
Sorting:
- A tool for fuzzing for ports that allow outgoing connections☆17Oct 15, 2018Updated 7 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- A http package for IncludeOS☆14Dec 1, 2016Updated 9 years ago
- Deobfuscate Babel 8.5's VM☆12Aug 11, 2016Updated 9 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆20Feb 23, 2017Updated 9 years ago
- personal fork of OSINT tool recon-ng☆16Dec 17, 2017Updated 8 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Dec 2, 2024Updated last year
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- pArAnoIA - Tiny "Secure" Browser☆12Nov 2, 2024Updated last year
- This is an example of SSH Man in the Middle (MITM) attack using Mininet and Ettercap☆15Sep 24, 2015Updated 10 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- An example rootkit that gives a userland process root permissions☆78Oct 17, 2019Updated 6 years ago
- Reverse shell generator☆23Oct 3, 2019Updated 6 years ago
- cms识别☆13Dec 2, 2017Updated 8 years ago
- Mobile Pentest related stuff☆14Jun 14, 2017Updated 8 years ago
- An agent that performs user actions on a workstation☆13Jan 22, 2018Updated 8 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 12 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Apr 19, 2023Updated 2 years ago
- ☆11Feb 20, 2015Updated 11 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Jun 21, 2021Updated 4 years ago
- ☆17Oct 15, 2017Updated 8 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- Tunnel IP over ICMP.☆16Jul 13, 2016Updated 9 years ago
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆13Jun 12, 2017Updated 8 years ago
- 🀄️ WebShell Backdoor Framework☆16Jun 7, 2018Updated 7 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Jan 31, 2019Updated 7 years ago
- Note:- Run this Script in root user.☆16Oct 13, 2017Updated 8 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in p…☆12Jan 10, 2020Updated 6 years ago
- Simple webinterface combining different recon tools.☆12Mar 2, 2018Updated 8 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26May 5, 2021Updated 4 years ago
- An android spying application☆38Jul 25, 2018Updated 7 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- My presentations from different conferences☆15Sep 12, 2018Updated 7 years ago
- A tool for communicating with FingerTec access control devices, as well as other ZKTeco based devices☆21Jan 10, 2017Updated 9 years ago
- DHCP option injector☆42Jul 7, 2020Updated 5 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Apr 3, 2017Updated 8 years ago