forced-request / wXfLinks
Web Exploitation Framework - Beta Release
☆24Updated 10 years ago
Alternatives and similar repositories for wXf
Users that are interested in wXf are comparing it to the libraries listed below
Sorting:
- Juniper backdoor☆14Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- ☆31Updated 9 years ago
- Some source code snippets In my development.☆27Updated 3 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- Unix remote login tool, rootkit shell tool☆34Updated 10 years ago
- cross site scripting framework plugin for metasploit☆17Updated 12 years ago
- An evolving hacking framework written in python☆11Updated 10 years ago
- Win32 Shellcodes☆9Updated 7 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆10Updated 8 years ago
- Projects and POCs☆60Updated 11 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆59Updated 9 years ago
- Peach Fuzzer Web Frontend☆52Updated 4 years ago
- Try various exploits to get root☆19Updated 11 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Updated 9 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆28Updated 8 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Updated 11 years ago
- Shell script for testing the SSL/TLS Protocols☆33Updated 7 years ago
- A remote access trojan over DNS☆95Updated 9 years ago
- pwning & info gathering via user browser☆39Updated 10 years ago
- ☆20Updated last year
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 11 years ago
- PyCommands for Immunity Debugger☆28Updated 12 years ago
- Exploit collection for NT privilege escalation☆65Updated 9 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- On the fly TCP and UDP network fuzzer☆16Updated 5 years ago
- Exploits used on hacking CTF's☆28Updated 5 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Updated 12 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago