Automatically exported from code.google.com/p/hookme
☆13Oct 8, 2015Updated 10 years ago
Alternatives and similar repositories for hookme
Users that are interested in hookme are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Sep 16, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Aug 6, 2020Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Jan 20, 2020Updated 6 years ago
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 6 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79May 18, 2017Updated 8 years ago
- SMBMap is a handy SMB enumeration tool☆38Jun 18, 2024Updated last year
- Automatically exported from code.google.com/p/jamaal-re-tools☆13Oct 4, 2015Updated 10 years ago
- Converts a command to a base64 powershell compatible string☆27Jul 31, 2014Updated 11 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Apr 5, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆62Jul 8, 2017Updated 8 years ago
- A collection of modifed PowerShell Scripts for CrackMapExec (https://github.com/byt3bl33d3r/CrackMapExec)☆56Mar 26, 2019Updated 7 years ago
- Windows Network File System Remote exploit for CVE-2022-30136☆14Jul 11, 2023Updated 2 years ago
- A mirror of the original SSLstrip+ code by Leonardo Nve☆183Jun 29, 2018Updated 7 years ago
- Malware management program and tools☆28Dec 16, 2015Updated 10 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Oct 26, 2020Updated 5 years ago
- Python libraries for Windows system coding☆15May 13, 2020Updated 5 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆14Dec 24, 2019Updated 6 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆16Jun 8, 2020Updated 5 years ago
- uses keywords from alert logs to send SMS☆24Nov 20, 2015Updated 10 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- Proof of concept of VMSA-2017-0012☆41Jul 27, 2017Updated 8 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- Example managed and unmanaged plugins for CoreHook☆14Mar 3, 2019Updated 7 years ago
- Tool for injecting .net library in native process (or not native with some limitations).☆16Jul 12, 2012Updated 13 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A x86/x64 class library that can be injected into unmanaged processes☆11Sep 6, 2020Updated 5 years ago
- Spoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug☆86Mar 27, 2019Updated 6 years ago
- Raspberry Pi Emulator☆11Jul 25, 2014Updated 11 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆15May 17, 2020Updated 5 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆14Jan 6, 2019Updated 7 years ago
- Miscellaneous parsing scripts for penetration testing☆12Jul 17, 2023Updated 2 years ago