chuckixia / Mirai-Source-CodeLinks
Leaked Mirai Source Code - make it vagrantized
☆29Updated 4 years ago
Alternatives and similar repositories for Mirai-Source-Code
Users that are interested in Mirai-Source-Code are comparing it to the libraries listed below
Sorting:
- ☆15Updated 8 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- IPV6 MITM attack tool☆92Updated 12 years ago
- Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049☆51Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆100Updated 7 years ago
- A shellcode testing harness.☆70Updated last year
- A collection of publicly released whitepapers☆49Updated 7 years ago
- tundeep☆42Updated 6 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 2 years ago
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 6 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- Suricata rules for Emerging Threats and funkyness☆75Updated 8 years ago
- intel amt honeypot☆18Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- NMAP NSE scripts - (not all)) my contributions before merging to nmap svn☆36Updated 10 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- Rogue AP killer☆90Updated 7 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 6 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆80Updated 7 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆29Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago