eudemonics / scaredycatLinks
Python script to generate a malicious MP4 file and start a CherryPy web server hosting a simple HTML page with the embedded file. Exploits another Stagefright vulnerability, the integer overflow (CVE-2015-3864).
☆17Updated 10 years ago
Alternatives and similar repositories for scaredycat
Users that are interested in scaredycat are comparing it to the libraries listed below
Sorting:
- ☆24Updated 9 years ago
- Automated install process for Phishing Frenzy☆23Updated 11 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 8 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆15Updated 9 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆34Updated 6 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 6 years ago
- Recursively searches a directory for any file containing a specified string☆48Updated 10 years ago
- ☆21Updated 6 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Updated 10 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Updated 7 years ago
- DNS Enumeration with Asynchronicity☆45Updated 7 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 7 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 8 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Updated 8 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 8 years ago
- Search the ExploitDB with a little more control☆22Updated 8 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Updated 7 years ago
- MS17-010☆12Updated 8 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆23Updated 7 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Updated 5 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- Generic malicious browser check written in C#☆13Updated 9 years ago