Fake currentTimeMillis() without class loader hacks
☆121Feb 18, 2021Updated 5 years ago
Alternatives and similar repositories for faketime
Users that are interested in faketime are comparing it to the libraries listed below
Sorting:
- st2-048☆40Jul 7, 2017Updated 8 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- Some xposed modules☆16Nov 27, 2018Updated 7 years ago
- Linux AV tests☆13Apr 23, 2019Updated 6 years ago
- Trojan downloader simple virus☆16Sep 30, 2018Updated 7 years ago
- ☆18Jun 23, 2017Updated 8 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- ☆13Feb 25, 2014Updated 12 years ago
- Juniper backdoor☆14Dec 24, 2015Updated 10 years ago
- DoS PoC's for SAP products☆51Jan 23, 2018Updated 8 years ago
- ☆18Oct 21, 2016Updated 9 years ago
- ☆19Jan 26, 2016Updated 10 years ago
- MongoDB Login Brute Forcer☆11Jun 22, 2014Updated 11 years ago
- ☆21Jan 18, 2018Updated 8 years ago
- A Generic Windows Memory Scraping Tool☆70Apr 20, 2017Updated 8 years ago
- st2-046-poc CVE-2017-5638☆21Aug 17, 2018Updated 7 years ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- HLS OSMF plugin - help to view m3u8 streams in the KDP/V2 player☆14Nov 16, 2020Updated 5 years ago
- ☆12Sep 9, 2015Updated 10 years ago
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- acunetix☆62Mar 27, 2020Updated 5 years ago
- 一些漏洞场景的还原,基于https://www.exploit-db.com/☆37Feb 7, 2018Updated 8 years ago
- ☆64Sep 5, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/chrome-redirector☆21Jul 28, 2015Updated 10 years ago
- ☆45Apr 22, 2017Updated 8 years ago
- Chrome 扩展,为百度搜索添加必应壁纸。☆11Jun 29, 2015Updated 10 years ago
- 通过调用zoomeye来获取安装JBoss机器的地址,然后通过HEAD请求植入webshell。 wxPython写了一个界面的控制程序。☆12Mar 28, 2018Updated 7 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- Various Jeb plugins, including obfuscation restore☆15Jun 3, 2015Updated 10 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Sep 13, 2017Updated 8 years ago
- ☆12Apr 13, 2017Updated 8 years ago
- 一个攻击框架☆10May 29, 2015Updated 10 years ago
- fix time for java application using javaAgent☆24Dec 3, 2017Updated 8 years ago
- DNS log http://zone.wooyun.org/content/27119☆21May 10, 2016Updated 9 years ago
- Use back camera capturing make WeChat's message content page's background transparent☆12Aug 17, 2016Updated 9 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 8 years ago
- ☆14May 17, 2018Updated 7 years ago