SherifEldeeb / inmetView external linksLinks
A multi-purpose meterpreter executable (inline, many transports, msfpayload)
☆81Mar 7, 2018Updated 7 years ago
Alternatives and similar repositories for inmet
Users that are interested in inmet are comparing it to the libraries listed below
Sorting:
- A "tiny" meterpreter stager☆127Aug 20, 2019Updated 6 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- ☆65May 26, 2016Updated 9 years ago
- ☆52Apr 14, 2015Updated 10 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- A "not-evil" keylogger with Unicode support☆27Feb 2, 2013Updated 13 years ago
- Executes PowerShell from an unmanaged process☆29Dec 15, 2014Updated 11 years ago
- all things awesome security☆14Jan 11, 2016Updated 10 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 11 years ago
- C++ Code Injector Class☆22Oct 2, 2020Updated 5 years ago
- Simple RAT (only on own network) made in C++☆19Mar 11, 2013Updated 12 years ago
- PowerShell implementations of path-finding algorithms using graph theory☆79Feb 17, 2016Updated 9 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Process Hollowing demonstration & explanation☆35Feb 25, 2021Updated 4 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆22Oct 29, 2012Updated 13 years ago
- Process Hollowing techniques as used in many file Crypters (C/C++)☆85Oct 1, 2020Updated 5 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Mutable Universal Relay Document Kit☆17Oct 31, 2014Updated 11 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- InfoPath Phishing Repo Resource☆68Oct 26, 2017Updated 8 years ago
- HTTP/S Beaconing Implant☆311Aug 25, 2017Updated 8 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆96Feb 11, 2012Updated 14 years ago
- Various Crypter Project☆55Feb 26, 2014Updated 11 years ago
- meterpreter connetion☆24Nov 27, 2017Updated 8 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- A simple scanner to find and brute force tomcat manager logins☆27Dec 11, 2019Updated 6 years ago
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆30May 20, 2021Updated 4 years ago
- Listening Post for Throwback Implant☆111Jan 26, 2016Updated 10 years ago
- A General Purpose DLL & Code Injection Utility☆157Jan 27, 2018Updated 8 years ago