chuckixia / Mirai-Source-CodeLinks
Leaked Mirai Source Code - make it vagrantized
☆29Updated 4 years ago
Alternatives and similar repositories for Mirai-Source-Code
Users that are interested in Mirai-Source-Code are comparing it to the libraries listed below
Sorting:
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Some NSE scripts to search information from routers☆35Updated 10 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 8 years ago
- ☆16Updated 9 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 12 years ago
- A collection of publicly released whitepapers☆49Updated 8 years ago
- ☆90Updated 8 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 11 years ago
- Distributed wrapper around oclHashcat☆92Updated 9 months ago
- IPV6 MITM attack tool☆92Updated 12 years ago
- Detect sandbox by cursor movement speed☆52Updated 2 years ago
- A shellcode testing harness.☆70Updated last year
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 9 years ago
- Python tools for interacting with a DarkComet Client☆54Updated 10 years ago
- Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049☆51Updated 8 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 8 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆60Updated 11 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Rogue AP killer☆91Updated 7 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆35Updated 12 years ago