TCP session interception and injection framework
☆55Mar 22, 2011Updated 15 years ago
Alternatives and similar repositories for thicknet
Users that are interested in thicknet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Dec 6, 2010Updated 15 years ago
- A JBoss script for obtaining remote shell access☆178Aug 7, 2020Updated 5 years ago
- A Java Server Faces (JSF) testing tool for decoding view state and creating view state attack vectors.☆33Dec 7, 2010Updated 15 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆125Apr 12, 2015Updated 11 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- Set of test cases that can be used to test custom implementations of the SecRules language (ModSecurity rules format).☆16Apr 28, 2026Updated 3 weeks ago
- Android app for tracking your locations and uploading them on your private server☆11Jul 1, 2017Updated 8 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆24Oct 8, 2014Updated 11 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Apr 21, 2017Updated 9 years ago
- ☆20Jan 18, 2024Updated 2 years ago
- ☆50Feb 5, 2014Updated 12 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- SpiderLabs shared Nmap Tools☆231Aug 7, 2020Updated 5 years ago
- A repository of tools and scripts related to malware analysis☆254Jul 29, 2016Updated 9 years ago
- Utility to manipulate SDBM files used by ModSecurity. With that utility it is possible to _shrink_ SDBM databases. It is also possible to…☆22Aug 16, 2024Updated last year
- Python script for dumping firmware from read-back protected nRF51 chips☆14Jan 17, 2018Updated 8 years ago
- The initial conversation slides and menu of scenarios☆38Jun 13, 2021Updated 4 years ago
- LKM Rootkit based on Diamorphine☆15Oct 31, 2018Updated 7 years ago
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 13 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Open Source Office Malware Generation & Polymorphic Engine for Red Teams and QA testing☆95Apr 5, 2017Updated 9 years ago
- Inject shellcode into running processes in Linux.☆44Jul 10, 2024Updated last year
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- Memcache hacking tool.☆47Apr 20, 2017Updated 9 years ago
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆37May 29, 2015Updated 10 years ago
- A bunch of scripts used for network defense during competitions.☆15Apr 3, 2015Updated 11 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 7 years ago
- Get version headers from a list of websites☆12Oct 1, 2020Updated 5 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆82Jun 4, 2013Updated 12 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆66May 16, 2024Updated 2 years ago
- ☆16May 6, 2015Updated 11 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 10 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Jun 5, 2017Updated 8 years ago
- PoC code from blog☆17Mar 10, 2020Updated 6 years ago
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Nov 15, 2016Updated 9 years ago