adamnew123456 / port-forward
A simple port forwarding utility for TCP and UDP
☆14Updated 11 years ago
Alternatives and similar repositories for port-forward:
Users that are interested in port-forward are comparing it to the libraries listed below
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Updated 3 years ago
- Exploit kit analyzer☆21Updated 10 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆11Updated 10 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 3 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Updated 9 years ago
- sudo almost as fake as your ma☆16Updated 8 years ago
- A simple exploitable ActiveX control for RE/VR☆19Updated 10 years ago
- SNMP Backdoor Communication Channel☆16Updated 13 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Updated 7 years ago
- Proof of concept demo for a tool that listens for keywords, and records audio to a file.☆12Updated 7 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 4 months ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Scanner for Regin Virtual Filesystems☆26Updated 10 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Updated 9 months ago
- Download youtube video cover image.☆7Updated 7 years ago
- ZeroRemote Trojan SRC Extract☆19Updated 8 years ago
- Capture Webcam Reflective Dll☆8Updated 8 years ago
- Educational Python penetration testing framework☆10Updated 7 years ago
- DNS TCP to UDP proxy☆9Updated 9 years ago
- Scanner for document roots/URLs.☆14Updated 13 years ago
- This version touches disk for registry persistence.☆26Updated 9 years ago
- ☆35Updated 7 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- DLL Injection commandline utility☆26Updated 12 years ago
- Brute force para MySQL com algoritmo que utiliza nome do domínio como usuário e senha, dentre outras funcionalidades.☆15Updated 9 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆13Updated 8 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- A library which makes modification of browsers' behavior easy.