adamnew123456 / port-forward
A simple port forwarding utility for TCP and UDP
☆14Updated 11 years ago
Alternatives and similar repositories for port-forward:
Users that are interested in port-forward are comparing it to the libraries listed below
- Simple Antivirus☆11Updated 8 years ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Updated 2 years ago
- Exploit kit analyzer☆21Updated 9 years ago
- XLOCK Is a light, and powerful file locker that with features such as an interactive file interface, work in-progress shell with commands…☆13Updated 6 years ago
- sudo almost as fake as your ma☆16Updated 7 years ago
- A small, unfinished utility to browse and download NirSoft programs.☆17Updated 4 years ago
- Brute force para MySQL com algoritmo que utiliza nome do domínio como usuário e senha, dentre outras funcionalidades.☆15Updated 9 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 9 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆10Updated 10 years ago
- SNMP Backdoor Communication Channel☆15Updated 13 years ago
- Proof of concept demo for a tool that listens for keywords, and records audio to a file.☆12Updated 7 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆27Updated 10 years ago
- BlackWorm SRC Extract☆16Updated 8 years ago
- Automatically exported from code.google.com/p/hookme☆13Updated 9 years ago
- MBRLocker Builder v0.2 Generic serial finder☆12Updated 9 years ago
- This version touches disk for registry persistence.☆25Updated 9 years ago
- Capture Webcam Reflective Dll☆8Updated 8 years ago
- ZeroRemote Trojan SRC Extract☆19Updated 7 years ago
- Finder Predator The Thief botnet panel☆7Updated 5 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- Sandboxie Python Client☆23Updated 12 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆15Updated 7 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Updated 6 months ago
- A simple shellcode runner☆20Updated 10 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- LD_PRELOAD rootkit utils☆16Updated 9 years ago
- Debugger checks in 3 ways☆18Updated 7 years ago