hackerschoice / segfaultLinks
☆390Updated 2 months ago
Alternatives and similar repositories for segfault
Users that are interested in segfault are comparing it to the libraries listed below
Sorting:
- Make BASH stealthy and hacker friendly with lots of bash functions☆257Updated this week
- SSH based reverse shell☆1,115Updated 2 weeks ago
- reverse shell using curl☆457Updated last year
- Connect like there is no firewall. Securely.☆1,687Updated last week
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆610Updated 6 months ago
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆306Updated last week
- Wiretap is a transparent, VPN-like proxy server that tunnels traffic via WireGuard and requires no special privileges to run.☆948Updated last month
- ☆344Updated 2 years ago
- Zaps arguments and environment from the process list☆199Updated last year
- Hash type identifier (CLI & lib)☆875Updated last month
- A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them bi…☆348Updated 2 months ago
- a signal handler race condition in OpenSSH's server (sshd)☆477Updated 11 months ago
- Tunnel TCP connections through a file☆929Updated 2 weeks ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆141Updated last year
- Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway a…☆263Updated last year
- Statically-linked ssh server with reverse shell functionality for CTFs and such☆976Updated 2 years ago
- Sticky notes for pentesting, bug bounty, CTF.☆699Updated last month
- This repository presents a proof-of-concept of CVE-2023-7028☆240Updated last year
- Go CLI and Library for quickly mapping organization network ranges using ASN information.☆867Updated this week
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆842Updated 2 months ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆610Updated 2 weeks ago
- The most exhaustive list of reliable DNS resolvers.☆785Updated this week
- Harvest passwords automatically from OpenSSH server☆373Updated 2 years ago
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆643Updated 2 years ago
- Try to find the origin IP of a webapp protected by Cloudflare.☆351Updated 9 months ago
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆440Updated last year
- ☆233Updated 8 months ago
- Spoof emails from any of the +2 Million domains using MailChannels (DEFCON 31 Talk)☆337Updated last year
- Fast and customizable subdomain wordlist generator using DSL☆814Updated last month
- An experimental high-performance DNS query bruteforce tool built with AF_XDP for extremely fast and accurate bulk DNS lookups.☆206Updated last month