Vidimensional / Icmp-File-Transfer
Send files through the ICMP protocol
☆42Updated 10 years ago
Related projects: ⓘ
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- A collection of shellcodes☆66Updated 12 years ago
- Reverse shell and rootkit☆19Updated 7 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆20Updated 9 years ago
- LD_PRELOAD rootkit☆21Updated 9 years ago
- ☆14Updated this week
- ☆22Updated this week
- ☆11Updated this week
- Post Exploitation Linux Toolkit☆33Updated 7 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- collection of useful shells for penetration tests☆36Updated 7 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 10 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆12Updated 12 years ago
- Automatically parses and attacks BloodHound-generated graphs☆40Updated 6 years ago
- Web Application Firewall For Limited Exploitation☆17Updated 6 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 9 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- ☆12Updated this week
- Metasploit exploit suggester using OpenVAS XML output☆17Updated 6 years ago
- ☆19Updated this week
- Exploit kit analyzer☆21Updated 9 years ago
- PoC Linux backdoor program to allow the "remote" use of terminal from client to the compromised machine.☆6Updated 8 years ago
- Inject shellcode into running processes in Linux.☆39Updated 2 months ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆47Updated 7 years ago
- Efficient clustering of MASSCAN results☆12Updated 7 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆21Updated 6 years ago
- A Linux backdoor with the goal of circumventing network firewalls.☆16Updated 12 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 6 years ago
- Honeypot for router backdoor (TCP 32764)☆15Updated 10 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 7 years ago