OpenSSH 6.7p1 backdoor kit
☆21Oct 23, 2014Updated 11 years ago
Alternatives and similar repositories for bl0wsshd00r67p1
Users that are interested in bl0wsshd00r67p1 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Python interface for YARA http://virustotal.github.io/yara/☆20Jul 13, 2017Updated 8 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 7 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- Nice try reading NTDLL from disk, nerd.☆19Apr 18, 2022Updated 4 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Dec 1, 2016Updated 9 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆74Nov 6, 2016Updated 9 years ago
- 本脚本是HIDS组成的一部分,旨在对指定监控目录进行文件hash记录,定时运行,发现文件替换、修改等后门可疑程序。☆13Dec 15, 2017Updated 8 years ago
- Multi Thread POST|GET (BLIND/TIME BASED/HEADER/SQL/XSS/LFI) INJECTION SCANNER☆12Jun 22, 2013Updated 12 years ago
- Windows hard shutdown shellcode. Don't need administrator rights.☆14Mar 31, 2016Updated 10 years ago
- C# Implementation of Get-VaultCredential☆14Jul 31, 2018Updated 7 years ago
- Web shells for PHP/ASP/ASP.NET using the least number of characters☆14Sep 27, 2023Updated 2 years ago
- Snippets of scripting randomness☆13Jun 9, 2022Updated 3 years ago
- Take output from nmap and turn it into something easily searchable and readable.☆34Jul 28, 2016Updated 9 years ago
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆24Nov 23, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago
- Modified proxmark3 firmware to perform brute forcing of 26-Bit ProxCards☆12Sep 26, 2016Updated 9 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆66May 16, 2024Updated last year
- Colocando el dominio de correo electrónico de una empresa se obtiene información usando el DNS, NMAP y Shodan☆16Feb 25, 2020Updated 6 years ago
- ☆20Jan 18, 2024Updated 2 years ago
- ☆28Mar 14, 2026Updated last month
- Flash crossdomain policy security checker☆26Oct 3, 2015Updated 10 years ago
- Event Masker is a Splunk streaming command to mask event from search based on a list of rules that contain conditions.☆16Oct 11, 2022Updated 3 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ECMAScript AST query library.☆12Jul 7, 2020Updated 5 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Jun 8, 2015Updated 10 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- metasploit loader with antivirus bypass module☆18Jun 26, 2016Updated 9 years ago
- A simple kitchen timer implemented in digital logic on a Lattice MachXO2 CPLD.☆14Feb 21, 2017Updated 9 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- Vulnerability scanner☆14Jan 11, 2019Updated 7 years ago
- a small tool for auditting weak ssh password☆23Feb 24, 2018Updated 8 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- 用于网站(HTTP)自动化判断开放和网页快照拍摄☆12Jan 25, 2021Updated 5 years ago
- abuse Pureftpd FXP to obtain the ipv6 of the target server☆11Jun 4, 2021Updated 4 years ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- ProFTPD IAC Remote Root Exploit☆37Aug 13, 2017Updated 8 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 13 years ago
- ☆11Aug 2, 2017Updated 8 years ago
- An exploration and implementation of the lambda calculus.☆12Oct 18, 2016Updated 9 years ago