adamnew123456 / port-forwardLinks
A simple port forwarding utility for TCP and UDP
☆14Updated 11 years ago
Alternatives and similar repositories for port-forward
Users that are interested in port-forward are comparing it to the libraries listed below
Sorting:
- Exploit kit analyzer☆22Updated 10 years ago
- Extract LZMA sections from cable modem firmware images☆20Updated 11 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27Updated 9 years ago
- Citadel 1.3.5.1☆28Updated 12 years ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Updated 3 years ago
- Teensy code to brute force a keylogger's unlock code☆15Updated 9 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Service desk password tools.☆16Updated 8 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Updated 11 years ago
- LD_PRELOAD rootkit utils☆16Updated 10 years ago
- A network analysis algorithm for detecting bots on large networks.☆20Updated 12 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Updated 13 years ago
- Decrypts Cisco VPN Group Passwords☆18Updated 13 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆11Updated 10 years ago
- Network Guardian☆12Updated 8 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 9 years ago
- .NET Binary Deserializer/Serializer - For all formats: [MC-NBFX], [MC-NBFS], [MC-NBFSE]☆19Updated 6 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Updated 9 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 5 months ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13Updated 7 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- WPA/WPA2 autopwn script that parses captured handshakes and sends them to the Crackq☆31Updated 10 years ago
- Scripts used for phishing campaigns☆14Updated 11 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 9 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 9 months ago
- ☆10Updated 9 years ago