greenboxal / wifi-hijackLinks
Wifi DNS hijacker
☆26Updated 8 years ago
Alternatives and similar repositories for wifi-hijack
Users that are interested in wifi-hijack are comparing it to the libraries listed below
Sorting:
- This tool will listen on a given port, strip SSL encryption, forward traffic through a plain TCP proxy, then encrypt the returning traffi…☆31Updated 4 years ago
- Probably the first binary (PE/ELF) infector ever created in GoLang.☆50Updated 3 years ago
- Shellcode process injector☆28Updated 5 years ago
- post exploitation user monitoring tool☆20Updated 7 years ago
- Simple golang reverse shell☆20Updated 5 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 3 years ago
- Finding code caves in ELF files with GoLang☆26Updated 7 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 8 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆58Updated 4 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Updated 6 years ago
- Go API Client for Metasploit RPC API☆18Updated 7 months ago
- The best way to send emails in Go.☆12Updated 4 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 6 years ago
- Working exploit code for CVE-2019-17625☆19Updated 5 years ago
- Handy script to automate the attack☆22Updated 6 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Updated 7 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆63Updated 7 years ago
- Ransomware Decryptors☆36Updated 3 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Updated 5 years ago
- ☆33Updated 5 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Updated 8 years ago
- Lightweight library which allows the ability to map both native and managed assemblies into memory by either using process injection of a…☆32Updated 5 years ago
- Get a list of installed software in a safe manner☆11Updated 8 years ago
- Experimenting with destructive file attacks in Go☆19Updated 6 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Updated 8 years ago
- "Polymorphic" shellcode generator (x86)☆25Updated 11 years ago
- ☆20Updated 6 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago