blasty / ssh_rapeLinks
☆38Updated 8 years ago
Alternatives and similar repositories for ssh_rape
Users that are interested in ssh_rape are comparing it to the libraries listed below
Sorting:
- LD_PRELOAD rootkit☆24Updated 10 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 11 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 9 years ago
- ☆15Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 6 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- ☆14Updated 9 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆21Updated 10 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 9 years ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13Updated 7 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 10 years ago
- Yet Another Repetitive Rootkit☆9Updated 11 years ago
- ☆31Updated 8 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 9 years ago
- Mobile Application Vulnerability Detection☆12Updated 8 years ago
- ☆16Updated 9 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago