byt3bl33d3r / shellcode_retrieverLinks
Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!
☆22Updated 10 years ago
Alternatives and similar repositories for shellcode_retriever
Users that are interested in shellcode_retriever are comparing it to the libraries listed below
Sorting:
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Updated 11 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
- Automatically exported from code.google.com/p/hookme☆14Updated 10 years ago
- Converts a command to a base64 powershell compatible string☆27Updated 11 years ago
- Automated install process for Phishing Frenzy☆24Updated 11 years ago
- Open-source Exploiting Framework☆31Updated 8 years ago
- Side Channel script☆25Updated 2 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 14 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 8 years ago
- Optional plugins for MITMf☆17Updated 11 years ago
- A Linux backdoor with the goal of circumventing network firewalls.☆16Updated 14 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 11 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Updated 10 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 11 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- PHP Phishing Framework☆28Updated 12 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 4 years ago
- ssh session type for metasploit☆101Updated 3 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 7 years ago
- Scapy tools and scripts☆20Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- Multi source CVE/exploit parser.☆27Updated 8 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Updated 8 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆16Updated 9 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Updated 7 years ago
- A collection of curated Java Deserialization Exploits☆11Updated 7 years ago