SleepTheGod / TCP-Data-Transfer-ToolLinks
TCP Data Transfer Tool By ClumsyLulz
☆12Updated 2 years ago
Alternatives and similar repositories for TCP-Data-Transfer-Tool
Users that are interested in TCP-Data-Transfer-Tool are comparing it to the libraries listed below
Sorting:
- MacroExploit use in excel sheet☆20Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- ☆18Updated 6 months ago
- ☆12Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 10 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- ☆22Updated last year
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- exfiltration/infiltration toolkit☆23Updated last year
- ☆17Updated last year
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- ManageEngine ADManager Command Injection☆11Updated last year
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated last year
- ☆25Updated 2 years ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 2 years ago
- ☆28Updated last year
- Cobalt Strike BOFS☆16Updated last year
- ☆17Updated last year
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- Beacon Object Files used for Cobalt Strike☆19Updated last year
- Searching .evtx logs for remote connections☆23Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Updated 10 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆15Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆7Updated 2 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 2 years ago