chuckixia / Mirai-Source-CodeLinks
Leaked Mirai Source Code - make it vagrantized
☆29Updated 4 years ago
Alternatives and similar repositories for Mirai-Source-Code
Users that are interested in Mirai-Source-Code are comparing it to the libraries listed below
Sorting:
- ☆16Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- Some NSE scripts to search information from routers☆35Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Python-based SMB Share scanner -- scans a bunch of computers, outputs the path and the file permissions for the account☆43Updated 8 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 6 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 9 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Updated 3 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 7 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 9 years ago
- Detect sandbox by cursor movement speed☆52Updated 2 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆58Updated 10 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- intel amt honeypot☆18Updated 8 years ago
- A shell / chat bot for XMPP and cloud services☆48Updated 10 years ago
- Rogue AP killer☆92Updated 7 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 8 years ago