eudemonics / scaredycat
Python script to generate a malicious MP4 file and start a CherryPy web server hosting a simple HTML page with the embedded file. Exploits another Stagefright vulnerability, the integer overflow (CVE-2015-3864).
☆17Updated 9 years ago
Alternatives and similar repositories for scaredycat
Users that are interested in scaredycat are comparing it to the libraries listed below
Sorting:
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆14Updated 8 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- ☆15Updated 2 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Red Teaming with Kali Linux. OS Customization, additional tools, and automated updates☆12Updated 8 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Converts a command to a base64 powershell compatible string☆26Updated 10 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- ☆24Updated 9 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 7 years ago
- Windows Privesc Check☆20Updated 10 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- AV Bypass☆29Updated 7 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Updated 8 years ago
- Tools for use with phishing frenzy☆11Updated 6 years ago
- ☆20Updated 5 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- Software exploitation training material☆15Updated 7 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- A multi-threaded class C network scanner. Loosely based on propecia.c by Bind.☆12Updated 10 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆17Updated 8 years ago