SafeBreach-Labs / pyekabooView external linksLinks
Proof-of-concept program that is able to to hijack/hook/proxy Python module(s) thanks to $PYTHONPATH variable
☆153May 4, 2017Updated 8 years ago
Alternatives and similar repositories for pyekaboo
Users that are interested in pyekaboo are comparing it to the libraries listed below
Sorting:
- python audit tool 审计 注入 inject☆182Feb 25, 2016Updated 9 years ago
- ☆51Aug 16, 2018Updated 7 years ago
- Project for the Crypto subject at Uni☆18Dec 26, 2016Updated 9 years ago
- ☆13Apr 11, 2018Updated 7 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- Monitor and prevent unexpected behavior of Java programs.☆14Jul 6, 2021Updated 4 years ago
- 一个半自动化命令注入漏洞Fuzz工具(One Semi-automation command injection vulnerability Fuzz tool)☆92Sep 28, 2017Updated 8 years ago
- A plugin to check xss by using chrome_headless☆52Sep 17, 2018Updated 7 years ago
- Detect silent (unwanted) changes to files on your system☆162May 4, 2020Updated 5 years ago
- ☆12Oct 29, 2015Updated 10 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆141May 25, 2017Updated 8 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆442Jul 11, 2017Updated 8 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆18Jul 2, 2021Updated 4 years ago
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- ☆86Feb 28, 2017Updated 8 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Jul 3, 2020Updated 5 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26May 10, 2018Updated 7 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆840Jun 25, 2024Updated last year
- ☆16Jul 20, 2020Updated 5 years ago
- YSOSERIAL Integration with burp suite☆165Dec 16, 2022Updated 3 years ago
- ☆62Aug 7, 2020Updated 5 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Oct 22, 2016Updated 9 years ago
- python audit tool 审计 注入 inject☆34Feb 25, 2016Updated 9 years ago
- EternalRocks worm☆467May 25, 2017Updated 8 years ago
- ☆230May 10, 2018Updated 7 years ago
- ☆166Apr 25, 2017Updated 8 years ago
- A reverse socks5 proxy server and client☆18Oct 19, 2017Updated 8 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Modified dropbear server which acts as a client and allows authless login☆126Aug 27, 2018Updated 7 years ago
- X41 BeanStack - Stack Trace Fingerprinting BETA☆52Dec 3, 2025Updated 2 months ago
- 从扫 描器结果分离出的一些大公司泛解析ip列表☆60Jun 8, 2017Updated 8 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆526Apr 14, 2023Updated 2 years ago
- A collection of curated Java Deserialization Exploits☆592May 16, 2021Updated 4 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- Fast browser-based network discovery module☆115May 26, 2021Updated 4 years ago
- Fancy Bear Source Code☆263Jan 9, 2017Updated 9 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆55Mar 27, 2017Updated 8 years ago