Kerang is a Another Webshell Backdoor, For Educational Purposes!
☆15Oct 31, 2017Updated 8 years ago
Alternatives and similar repositories for Kerang
Users that are interested in Kerang are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Plog - A simple and powerful keylogger !☆11Jun 28, 2018Updated 7 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 9 years ago
- SkyRAT - Powershell Remote Administration Tool☆34Jan 8, 2018Updated 8 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- Source dari buku 42 Tips Sukses Kerja Remote☆18Jun 13, 2015Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- BlackHat Europe 2017 Slides☆25Feb 15, 2018Updated 8 years ago
- BitPing A Simple Bitcoin Address Changer From Clipboard☆11Jun 28, 2018Updated 7 years ago
- A novel rootkit under linux(test under cents 5.4) combine with preload_inject and sys_table modify☆19Nov 2, 2013Updated 12 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Dec 18, 2017Updated 8 years ago
- cross site scripting framework plugin for metasploit☆17Aug 23, 2012Updated 13 years ago
- Decompiled source code of GhostCtrl. It’s not the original source code☆10Jul 26, 2017Updated 8 years ago
- Proof of Concepts, Exploits☆28Apr 8, 2025Updated 11 months ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- crash poc & Leak info PoC☆18Mar 19, 2018Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Files to build Docker image of Capture the Flags (CTF) game☆19Jan 25, 2018Updated 8 years ago
- ☆16Aug 10, 2018Updated 7 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆76Nov 25, 2016Updated 9 years ago
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- cve-2014-0130 rails directory traversal vuln☆18May 15, 2017Updated 8 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26May 10, 2018Updated 7 years ago
- A PoC for CVE-2018-7249☆15Apr 29, 2025Updated 10 months ago
- Opens a reverse PowerShell terminal to the client. Shell receives commands through TCP☆24Apr 18, 2015Updated 10 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆15Sep 13, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- x86_64 linux rootkit using debug registers☆53Jan 11, 2022Updated 4 years ago
- ☆10Mar 17, 2026Updated last week
- Source code for 'Pro Python System Administration' by Rytis Sileika☆13Mar 28, 2017Updated 8 years ago
- A few exercises from Zed Shaw’s “Learn C the Hard Way”☆21Dec 16, 2019Updated 6 years ago
- ☆12May 9, 2017Updated 8 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- Cyber Jawara 2018 Final - Attack & Defense CTF services environments based on Docker.☆75Oct 18, 2018Updated 7 years ago
- CTF write-ups 2015☆19Jun 27, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- simple VM crackme demo☆31Jul 13, 2016Updated 9 years ago
- ☆17Oct 25, 2018Updated 7 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- DKMC - Dont kill my cat - Malicious payload evasion tool☆22Sep 7, 2017Updated 8 years ago
- Static Php Analysis and Fuzzer☆26Apr 22, 2014Updated 11 years ago
- Helps you to pull off a padding oracle attack.☆10Oct 29, 2018Updated 7 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago