TheFlash2k / methLinks
Packet Sniffer with capabilities to sniff raw tcp, udp, http, icmp, ftp, ssh, sftp packets and filter them using berkley filters
☆12Updated last month
Alternatives and similar repositories for meth
Users that are interested in meth are comparing it to the libraries listed below
Sorting:
- Legba recipes.☆51Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- ☆28Updated 5 years ago
- ☆23Updated 5 years ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆40Updated 3 years ago
- ☆26Updated 3 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- Man in the Browser Framework☆48Updated last year
- ☆30Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated last year
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Master of Science in Cybersecurity, Sapienza University of Rome.☆58Updated last year
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 5 years ago
- Miscellaneous tools for BloodHound☆18Updated 4 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆32Updated 4 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆63Updated 2 years ago
- Mobile Application Vulnerability Scanner☆25Updated 11 months ago
- ☆12Updated last year
- ☆19Updated 2 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Updated 2 months ago
- Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.☆51Updated last year
- Bypassing File Upload Restriction using Magic Bytes☆22Updated 3 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆45Updated 5 years ago