Vidimensional / Icmp-File-Transfer
Send files through the ICMP protocol
☆42Updated 10 years ago
Alternatives and similar repositories for Icmp-File-Transfer:
Users that are interested in Icmp-File-Transfer are comparing it to the libraries listed below
- Cronbased Dirty Cow Exploit☆31Updated 7 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 7 years ago
- Generates a MSF Reverse TCP RC4 payload encoded in Powershell to the clipboard☆9Updated 8 years ago
- A web app scanner☆26Updated 10 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- A collection of shellcodes☆67Updated 12 years ago
- LD_PRELOAD rootkit☆23Updated 10 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Updated 7 years ago
- Projects and POCs☆59Updated 10 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- A simple python script to dump data from memcached servers.☆11Updated 10 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆37Updated 4 years ago
- Reverse shell and rootkit☆19Updated 7 years ago
- ☆20Updated last year
- Automated Brute-Force Login Attacks Against EAP Networks.☆52Updated 4 years ago
- Small Backdoor/rootkit for linux kernel☆21Updated 10 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 10 years ago
- A Linux RAT in C☆32Updated 6 years ago
- Proof-of-concept malware programs. For educational purpose only.☆23Updated 8 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- Web Application Firewall For Limited Exploitation☆17Updated 7 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago