defuse / pastebinLinks
The defuse.ca pastebin.
☆23Updated 6 years ago
Alternatives and similar repositories for pastebin
Users that are interested in pastebin are comparing it to the libraries listed below
Sorting:
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Updated 13 years ago
- Clone of hidden tear written in C++☆70Updated 5 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Updated 9 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Updated 10 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Updated 9 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆71Updated 10 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35Updated 10 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.☆106Updated 11 years ago
- Viper is a brute-force password cracker.☆24Updated 9 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- ☆24Updated 10 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 8 years ago
- j0llydmper is a windows service that allows you to dump furtively and automaticaly some contents of USB disks just plugged in your comput…☆39Updated 13 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆58Updated 10 years ago
- SSH Based Remote Administration Tool☆103Updated 10 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- Fast asynchronous DNS Scanner/bruteforcer☆18Updated 14 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 9 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 11 years ago
- A shell / chat bot for XMPP and cloud services☆48Updated 10 years ago
- A network analysis algorithm for detecting bots on large networks.☆20Updated 12 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- Post Exploitation Linux Toolkit☆33Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 7 years ago