ShadowEye / envisioncollision
Getting Envisioncollision to actually work.
☆12Updated 7 years ago
Alternatives and similar repositories for envisioncollision:
Users that are interested in envisioncollision are comparing it to the libraries listed below
- shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION☆36Updated 7 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆44Updated 8 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆10Updated 5 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆21Updated 9 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.☆21Updated 7 years ago
- Public Advisories for Security Vulnerabilities.☆25Updated 9 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- Utilize Pastebin's scraping API to find interesting pastes.☆16Updated 5 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- flood area with fake essids☆20Updated 7 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Clone of Metasploit's wiki w/ additions☆15Updated 9 years ago
- Popping boxes with Nmap☆17Updated 12 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆26Updated 7 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆13Updated 4 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆12Updated 12 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- Generate customized and undetectable exploits for Metasploit.☆23Updated 7 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- Searches for interesting cached DNS entries.☆54Updated 10 years ago