abdilahrf / KerangLinks
Kerang is a Another Webshell Backdoor, For Educational Purposes!
☆15Updated 7 years ago
Alternatives and similar repositories for Kerang
Users that are interested in Kerang are comparing it to the libraries listed below
Sorting:
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- My presentations from different conferences☆15Updated 6 years ago
- Proof of Concepts, Exploits☆28Updated 3 months ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Updated 12 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- PLASMA PULSAR☆69Updated 8 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 7 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- Cgiemail - Source Code Disclosure/LFI☆15Updated 8 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 7 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- A simple python script to dump data from memcached servers.☆11Updated 11 years ago
- Win32 Shellcodes☆9Updated 7 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆48Updated 8 years ago
- misc pentest tools.☆26Updated 10 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- Peach Fuzzer Web Frontend☆52Updated 4 years ago
- Multi theaded DNS bruteforcing☆13Updated 11 years ago
- A framework for creating modular bots/backdoors☆21Updated 9 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆28Updated 8 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Updated 5 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- Usefull snippets / Computer-security oriented☆21Updated 8 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35Updated 10 years ago
- Customize Exploit Codes.☆18Updated 8 years ago