Xyl2k / SpyEye-v1.3-frm_findftp_sub.php_exploitView external linksLinks
SpyEye v1.3 bug exploiter (frm_findftp_sub.php)
☆19Sep 19, 2018Updated 7 years ago
Alternatives and similar repositories for SpyEye-v1.3-frm_findftp_sub.php_exploit
Users that are interested in SpyEye-v1.3-frm_findftp_sub.php_exploit are comparing it to the libraries listed below
Sorting:
- Board layout☆13Jul 1, 2015Updated 10 years ago
- Graphical user interface for the windows version of THC Hydra☆55Nov 27, 2017Updated 8 years ago
- Phishing detection regex for Blueteams☆12Dec 27, 2020Updated 5 years ago
- The great RSA Attacking Toolkit compiled for Windows☆18Jan 20, 2016Updated 10 years ago
- A self-hosted Telgram bot that integrates GPT with custom external tools☆16Oct 21, 2024Updated last year
- NFC/RFID Card Catcher or skimmer, call it whatever you want.☆73Jul 17, 2015Updated 10 years ago
- Sorano☆16Jul 30, 2019Updated 6 years ago
- Infecting PE☆25Mar 10, 2014Updated 11 years ago
- Bitcoin Key Finder☆18Jul 2, 2022Updated 3 years ago
- Fake msxfs.dll to debug ATM trojans☆55Sep 28, 2015Updated 10 years ago
- Duitku Payment gateway for PHPNuxBill☆13Aug 23, 2025Updated 5 months ago
- A Python-based multi-algo miner☆32Jun 9, 2024Updated last year
- ☆28Jul 17, 2025Updated 6 months ago
- ☆13Jul 13, 2020Updated 5 years ago
- original project for thermostat & hygrostat to made egg incubator☆10Aug 5, 2020Updated 5 years ago
- Backdoor implementation in Ruby (testing)☆30Jul 6, 2015Updated 10 years ago
- ☆10Aug 9, 2024Updated last year
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- This is a bash script used for ISPConfig 3 server migrations☆15Sep 13, 2016Updated 9 years ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- A few snippets to show how suricata stats can end up in Influx DB using logstash☆12Jul 11, 2016Updated 9 years ago
- Samsung Galaxy A52s 5G (a52sxq) TWRP Device Tree.☆12Jan 27, 2024Updated 2 years ago
- RIG Exploit Kit (front end)☆30Feb 25, 2015Updated 10 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- Run x509lint from a PostgreSQL function☆11Apr 3, 2020Updated 5 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated last month
- This is a simple computer based test project using solely html, css & javascript(ES5). The project can display questions from an API or s…☆19Oct 27, 2021Updated 4 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- ☆14Mar 10, 2021Updated 4 years ago
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- 👤 🗑 Deletes users that did not log in in the last days.☆10Updated this week
- ☆16Aug 17, 2025Updated 5 months ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- A complete API for Pastebin written in Java.☆10Sep 3, 2013Updated 12 years ago
- Fathimah bot Telegram support plugins.☆13Aug 19, 2017Updated 8 years ago
- Aplikasi untuk menganalisis log Mikrotik dengan interface modern menggunakan EJS, Express, Element UI, dan Alpine.js.☆27Nov 8, 2025Updated 3 months ago
- CGNAT em dispositivos baseados em RouterOS☆12May 14, 2019Updated 6 years ago