averagesecurityguy / mickeyLinks
python based backdoor software
☆17Updated 14 years ago
Alternatives and similar repositories for mickey
Users that are interested in mickey are comparing it to the libraries listed below
Sorting:
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- A shell / chat bot for XMPP and cloud services☆49Updated 10 years ago
- Automatically scans for malicious proxies.☆32Updated 10 years ago
- SSH Based Remote Administration Tool☆103Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Updated 9 years ago
- Simple web app for displaying cowrie data in your browser☆12Updated 9 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Updated 10 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆168Updated 10 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 9 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Exploit Dev Wiki☆13Updated 11 years ago
- A python script for obfuscating wireless networks☆79Updated 9 years ago
- ☆16Updated 9 years ago
- Metasploit Usage Wiki☆47Updated 10 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Updated 14 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Updated 10 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79Updated 8 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- Post Exploitation Linux Toolkit☆33Updated 9 years ago
- Some NSE scripts to search information from routers☆35Updated 10 years ago
- Recursively searches a directory for any file containing a specified string☆48Updated 10 years ago
- Flash crossdomain policy security checker☆26Updated 10 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago