advanced Perl Backdoor
☆13Jun 6, 2015Updated 10 years ago
Alternatives and similar repositories for perlbackdoor
Users that are interested in perlbackdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Run remote system commands from Oracle connection - oracle exec command perl☆12Jun 6, 2015Updated 10 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- An evolving hacking framework written in python☆11Jan 11, 2015Updated 11 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Nov 1, 2019Updated 6 years ago
- ML research on software vulnerabilities☆18Sep 8, 2019Updated 6 years ago
- Fast matching, e.g. for autocompletes☆31Oct 30, 2014Updated 11 years ago
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆14Feb 25, 2024Updated 2 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Post-explotation Hacks☆14Jan 6, 2019Updated 7 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 8 years ago
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- A free open source content management system and web application framework. The most widely deployed mod_perl application on the planet.☆40May 27, 2021Updated 4 years ago
- ☆33Oct 17, 2014Updated 11 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆41Apr 28, 2018Updated 7 years ago
- TLS SNI virtual hosts bruteforcer☆22Aug 26, 2014Updated 11 years ago
- Wifite for the WiFi Pineapple NANO + TETRA (Chaos Calmer - openWrt)☆20Apr 6, 2018Updated 7 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆19Nov 28, 2019Updated 6 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Sep 24, 2018Updated 7 years ago
- ☆10Sep 17, 2019Updated 6 years ago
- A set of demos and a PowerShell module to interact with DotNetInterop.☆69Apr 7, 2018Updated 7 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- We store attacks and exploits that we've found useful in our research☆13Jun 4, 2015Updated 10 years ago
- ZX81 emulator written in TypeScript (transcompilation)☆15Jul 16, 2023Updated 2 years ago
- Run phantom script in managed workers☆15Jul 20, 2022Updated 3 years ago
- A JavaScript zoom-on-hover tool for images, like a magnifying glass. Really cool.☆45Sep 1, 2013Updated 12 years ago
- Yet Another SMB PSEXEC (Y.A.S.P) Tool☆22Nov 2, 2013Updated 12 years ago
- ☆17Sep 9, 2022Updated 3 years ago
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Oct 11, 2019Updated 6 years ago
- This is a project I'm using to learn Rust and binary analysis.☆11Jan 20, 2022Updated 4 years ago
- Certificate Expiration Monitor script☆27Oct 10, 2018Updated 7 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Easy Repository pattern for PHP Phalcon framework.☆18Jul 4, 2018Updated 7 years ago
- Simple SSH brute-forcer written in Go☆24May 29, 2016Updated 9 years ago
- Valgrind tool for tracing memory accesses☆13Feb 6, 2025Updated last year
- ☆27Apr 8, 2017Updated 8 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Jan 30, 2017Updated 9 years ago