proof of concept to backdoor files from owncloud encryption module
☆17Mar 26, 2016Updated 9 years ago
Alternatives and similar repositories for pwncloud
Users that are interested in pwncloud are comparing it to the libraries listed below
Sorting:
- Host files with DNS☆33Mar 1, 2016Updated 10 years ago
- ☆12Oct 15, 2016Updated 9 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆10Feb 1, 2019Updated 7 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- ☆22Dec 31, 2018Updated 7 years ago
- Dominator Tree LLVM Pass to Test Satisfiability☆46Mar 14, 2016Updated 9 years ago
- spectrum monitoring system for GSM providers☆44Jan 10, 2016Updated 10 years ago
- ☆30Sep 1, 2022Updated 3 years ago
- An ARM Assembler and Simulator/Debugger☆15Jan 26, 2010Updated 16 years ago
- ☆10Aug 8, 2015Updated 10 years ago
- exploit dev. stuff☆20Aug 7, 2012Updated 13 years ago
- ☆27Jul 18, 2017Updated 8 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆54Jun 19, 2016Updated 9 years ago
- libopcodes-based disassembler☆35Aug 8, 2020Updated 5 years ago
- App for controlling the DNSCrypt Proxy on Android☆13Dec 28, 2017Updated 8 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Nov 16, 2017Updated 8 years ago
- The U-SIMonitor is an application for Android that performs AT-commands to the baseband modem of mobile phones. It can obtain the securit…☆16Feb 28, 2015Updated 11 years ago
- Android app to bypass SSL certificate validation (Certificate Pinning).☆16Feb 7, 2016Updated 10 years ago
- PowerShell module for the exploitation and testing☆16Jul 5, 2015Updated 10 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- ☆128Jun 12, 2015Updated 10 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆30Sep 26, 2014Updated 11 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- Timing Attack on TLS' ECDSA signature☆47Sep 8, 2015Updated 10 years ago
- Watch actual usage of memory(RAM) of an Application/Program to debug the memory leak issue☆26Feb 19, 2016Updated 10 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 11 months ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- CTF & practice exploit collection☆38Nov 30, 2016Updated 9 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- ThunderSec is a security plugin for Mozilla Thunderbird that creates several pieces of additional security functionality, including DNSBL…☆43Jun 3, 2016Updated 9 years ago
- Detect snooper on your system!☆85Feb 6, 2017Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Simple php backdoor based on extension☆22Feb 12, 2015Updated 11 years ago
- test your Diffie-Hellman parameters for safe primes and right sizes☆20May 23, 2016Updated 9 years ago
- pykd script to dynamically find vtables on heap (windows x86/x64)☆25Oct 14, 2014Updated 11 years ago
- Some metasploit scripts to help to control busybox based embedded devices☆30Aug 13, 2015Updated 10 years ago
- Python Nessus Library - libnessus is a python library to enable devs to chat with nessus XMLRPC API, parse, store and diff scan results. …☆24Feb 10, 2023Updated 3 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Jul 14, 2015Updated 10 years ago