SHIFT后门,适用于windows xp\2003 server\2008 server
☆17May 4, 2014Updated 11 years ago
Alternatives and similar repositories for Sethc_BackDoor
Users that are interested in Sethc_BackDoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- penetration testing framework that can use socks4/socks5 proxy.☆53Sep 6, 2014Updated 11 years ago
- A web app scanner☆24Jan 23, 2014Updated 12 years ago
- 过360主动防御360杀毒以前99%杀软的python后门☆72Nov 19, 2015Updated 10 years ago
- Sqlmap 批量操作☆11Jan 27, 2016Updated 10 years ago
- 自己使用的一些脚本,大概和乌云(wooyun)有关☆24Jun 15, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- linux lcx☆11Jul 18, 2016Updated 9 years ago
- Port Scan By Nmap☆13Jan 27, 2016Updated 10 years ago
- Keyboard Weak Password☆28Mar 29, 2016Updated 9 years ago
- A lightweight packet capture application☆12Oct 16, 2014Updated 11 years ago
- push☆24Apr 21, 2016Updated 9 years ago
- XMPP Man-in-the-Middle, quick & dirty☆41Feb 24, 2014Updated 12 years ago
- 这里会收集各种类型的CVE PoC 和EXP ,仅用来学习漏洞挖掘相关技术..☆31Sep 24, 2016Updated 9 years ago
- Metasploit reverse TCP stager fully undetectable☆18Nov 29, 2015Updated 10 years ago
- 介绍:这个是用来分享大家学习中使用的资料的,一个人 学习,不如大家一起学习 基于adobe提供的一个文件帐号,来达到共享学习资料的模式,建议都传pdf的文档上来 国内登录,有些慢,需要一点耐心,但是能实现各个终端同步阅读pdf,同时又不用泄漏其他比较隐私的账号 网址:h…☆12Sep 18, 2014Updated 11 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- 采集乌云已确认漏洞和已公开漏洞的状态、厂商、Rank等数据用于分析哪些是良心厂商☆14Jan 3, 2017Updated 9 years ago
- Minimal HTML5 game development lib☆43Mar 11, 2018Updated 8 years ago
- Anomaly detection and monitoring software☆19Sep 7, 2018Updated 7 years ago
- ☆17May 9, 2017Updated 8 years ago
- Web shell/backdoor written in php for web exploitation☆12Oct 12, 2021Updated 4 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆15Jun 3, 2016Updated 9 years ago
- A set of vulnerable PHP scripts used to test w3af's vulnerability detection features.☆28Apr 15, 2015Updated 10 years ago
- This is a backdoor about discover network device ,and it can hidden reverse connecting the hacker's server with encrypt commuication 后渗透后…☆198Aug 29, 2015Updated 10 years ago
- A passive online scanner from OWTF☆16Feb 16, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Pockr Asset Management 破壳资产管理工具☆11Dec 8, 2022Updated 3 years ago
- quant trading quant trading quant trading quant trading quant trading quant trading quant trading quant trading quant trading☆135Feb 26, 2026Updated last month
- A plug to write faster acceptance tests by skipping the sign-in process. This feature is inspired by Clearance’s backdoor.☆27Dec 2, 2021Updated 4 years ago
- OfficeBrute - brute force protected word documents☆23Feb 4, 2018Updated 8 years ago
- A lightweight batch scanning framework based on gevent.☆48Jun 22, 2018Updated 7 years ago
- based on search engine and get the valid infomation to test the vulnerability☆16Jun 16, 2016Updated 9 years ago
- 利用sqlmap和URL去重的爬虫写的一个大规模扫描的脚本☆58Jun 15, 2022Updated 3 years ago
- .NET WPF Framework☆20Mar 9, 2017Updated 9 years ago
- Patch pyc files with your code. Fairly lame.☆67Nov 10, 2015Updated 10 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Script that easily creates, signs and AV bypass .apk metasploit reverse_tcp payload.☆19Jun 14, 2020Updated 5 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Jan 2, 2019Updated 7 years ago
- Direct shell in C. Reverse shell in C. Both over TCP.☆36Dec 14, 2016Updated 9 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- ☆19Jan 26, 2016Updated 10 years ago
- ☆129Jul 17, 2015Updated 10 years ago
- DOOM是在thorn上实现的分布式任务分发的ip端口漏洞扫描器☆136Dec 1, 2015Updated 10 years ago