Cymothoa is a backdooring tool, that inject backdoor's shellcode directly into running applications. Stealth and lightweight...
☆18Aug 24, 2015Updated 10 years ago
Alternatives and similar repositories for cymothoa
Users that are interested in cymothoa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- Golang tool to scan hosts for SMB version and signing status☆15Nov 19, 2024Updated last year
- C# application that allows you to quick run SSH commands against a host or list of hosts☆42Sep 21, 2020Updated 5 years ago
- Python 3 update for https://code.google.com/archive/p/goofile/☆15Aug 19, 2019Updated 6 years ago
- A repo of utilities built over some period for forensics, anti-forensics, security and analytical purposes☆20Aug 23, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Call virtual methods on C++ classes from Go without cgo.☆27Feb 24, 2021Updated 5 years ago
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆13Aug 22, 2025Updated 7 months ago
- Shell wrapper with keylogger (local log or syslog)☆13Nov 1, 2017Updated 8 years ago
- A collection of hacks and one-off scripts☆10Jan 18, 2021Updated 5 years ago
- Docker Swarm - Promitheus, Grafana, Node Exporter, Loki, Promtail, Caddy☆29Jun 27, 2020Updated 5 years ago
- ☆12Apr 7, 2026Updated last week
- ☆16Nov 11, 2022Updated 3 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆28Aug 4, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- FTester - firewall and IDS testing tool [historical]☆24Aug 2, 2017Updated 8 years ago
- easy dll proxying in go☆14Apr 24, 2022Updated 3 years ago
- No computer is secure, mate. Brute force SSH really easily.☆15Jan 2, 2022Updated 4 years ago
- ☆16Aug 29, 2023Updated 2 years ago
- A C-based checksec without readelf or grep dependance.☆11Apr 20, 2021Updated 4 years ago
- HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.☆25Jul 26, 2017Updated 8 years ago
- Try to transport the tcpip stack of ReactOS to Windows XP.☆17Feb 27, 2014Updated 12 years ago
- Native Powers Talk demos☆17Jan 30, 2026Updated 2 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- ☆16Sep 9, 2021Updated 4 years ago
- A crawler for kernel releases distributed by the major Linux distributions.☆13Oct 18, 2024Updated last year
- Text field that only accept numeric value☆23Jun 21, 2023Updated 2 years ago
- Uptime checker for tor hidden services☆12Feb 14, 2018Updated 8 years ago
- Python script to exploit confluence path traversal vulnerability cve-2019-3398☆15Jun 6, 2019Updated 6 years ago
- Implements a MVC-like platform in a WordPress site.☆11Oct 18, 2019Updated 6 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Nov 18, 2024Updated last year
- ☆19Oct 22, 2025Updated 5 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- pArAnoIA - Tiny "Secure" Browser☆13Nov 2, 2024Updated last year
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆13Aug 4, 2025Updated 8 months ago
- Charter of the Open Network Infrastructure Association☆13Sep 9, 2017Updated 8 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆103May 25, 2018Updated 7 years ago
- Attributes sent to the server should be checked. This module allows you to cast data to its expected type before processing.☆13Jul 21, 2022Updated 3 years ago
- Keyhack - Golang API token/webhook validator☆16Mar 20, 2025Updated last year
- Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.☆16Sep 19, 2020Updated 5 years ago