Waffles-2 / SambaCryLinks
CVE-2017-7494 - Detection Scripts
☆63Updated 8 years ago
Alternatives and similar repositories for SambaCry
Users that are interested in SambaCry are comparing it to the libraries listed below
Sorting:
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 7 years ago
- OpenSSH remote DOS exploit and vulnerable container☆53Updated 7 years ago
- ☆20Updated last year
- Proof-of-Concept code for exploits☆82Updated 9 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- ☆74Updated 3 years ago
- Visual Basic GUI: A Tool to Inject Keystrokes on a SSH Client via an X11 Forwarded Session☆63Updated 7 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 11 years ago
- PLASMA PULSAR☆69Updated 8 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- Exploits, Fuzzers, Scripts etc☆34Updated 4 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Updated 9 years ago
- A command line Hash Identifying tool.☆101Updated 6 years ago
- An SNMPv1, v2c and v3 dictionary attack tool. Please see: https://penturalabs.wordpress.com/2016/04/01/snmpplux/☆20Updated 9 years ago
- A simple way for detection the remote user's antivirus☆84Updated 8 years ago
- A shell / chat bot for XMPP and cloud services☆48Updated 9 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Exploits used on hacking CTF's☆28Updated 6 years ago
- ☆14Updated 9 years ago
- LNHG - Mass Web Fingerprinter☆62Updated 9 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Updated 9 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- A collection of code snippets used in blog posts.☆54Updated 3 weeks ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- A scoreboard for Security CTF events☆37Updated 12 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- A collection of publicly released whitepapers☆49Updated 8 years ago
- Source Code Intelligence☆30Updated 8 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆80Updated 7 years ago