buffer / phoneycLinks
☆16Updated 10 years ago
Alternatives and similar repositories for phoneyc
Users that are interested in phoneyc are comparing it to the libraries listed below
Sorting:
- A malware/botnet analysis framework written in Ruby.☆195Updated 2 years ago
- Python Scanner for "ShellShock" (CVE-2014-6271)☆45Updated 11 years ago
- Juniper backdoor☆14Updated 9 years ago
- random python stuff☆26Updated 9 years ago
- ☆48Updated 2 years ago
- Exploits used on hacking CTF's☆28Updated 6 years ago
- Some kernel exploit i wrote☆75Updated 10 years ago
- Proof-of-concept program that is able to to hijack/hook/proxy Python module(s) thanks to $PYTHONPATH variable☆153Updated 8 years ago
- Patch pyc files with your code. Fairly lame.☆67Updated 10 years ago
- --= Xt9 - Anti - Rootkit =-- beta v0.11 by xti9er☆15Updated 4 years ago
- ☆37Updated 10 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Updated 8 years ago
- ssh key exchange layer for scapy☆13Updated 11 years ago
- Peach Fuzzer Web Frontend☆51Updated 4 years ago
- Some tools to monitor BillGates CnC servers☆135Updated 11 years ago
- ☆20Updated last year
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 11 years ago
- penetration testing framework that can use socks4/socks5 proxy.☆54Updated 11 years ago
- original cve-2013-2094 exploit and a rewritten version for educational purposes☆91Updated 12 years ago
- Static and Dynamic exploit analysis framework.☆23Updated 11 years ago
- Backdoor with Golang (Cross-Plateform)☆17Updated 3 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 10 years ago
- ☆15Updated 8 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Updated 11 years ago
- Network and USB protocol fuzzing toolkit.☆34Updated 8 years ago
- rename☆19Updated 8 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Updated 10 years ago
- A command line Hash Identifying tool.☆101Updated 6 years ago
- Unix remote login tool, rootkit shell tool☆33Updated 10 years ago