VNC pentest tool with bruteforce and ducky script execution features
☆24Nov 18, 2017Updated 8 years ago
Alternatives and similar repositories for VNCPwn
Users that are interested in VNCPwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- A 'Universal WHOIS' proxy server - you query it, it gives back the correct details☆11Mar 22, 2026Updated last week
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 6 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- IntelMQ Tutorial and Introductory Documentation☆15May 26, 2022Updated 3 years ago
- I created this USB Rubber Ducky payload a while back and just finnished touching it up a bit. Basically what it does is download malware …☆10Feb 7, 2019Updated 7 years ago
- Reads and prints information from the website MalAPI.io☆20Jul 14, 2022Updated 3 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Sep 15, 2019Updated 6 years ago
- C# Implementation of Get-VaultCredential☆14Jul 31, 2018Updated 7 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 9 years ago
- CyCAT.org API back-end server including crawlers☆29Feb 4, 2023Updated 3 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Apr 19, 2023Updated 2 years ago
- a exec jsp shell, simply like weevely php C/S shell.☆14Jun 21, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆27Jul 25, 2025Updated 8 months ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- .NET applications hacking toolset☆18Jan 12, 2021Updated 5 years ago
- ☆11Mar 19, 2019Updated 7 years ago
- interesting analysis☆16May 14, 2018Updated 7 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Jul 6, 2019Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- ☆11Nov 28, 2016Updated 9 years ago
- LD_PRELOAD rootkit☆24Oct 12, 2014Updated 11 years ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- Several self-defense shellcodes☆23Jul 16, 2019Updated 6 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆21May 11, 2017Updated 8 years ago
- Trojan downloader simple virus☆16Sep 30, 2018Updated 7 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- ☆19Jun 29, 2012Updated 13 years ago
- Bitcoin private key cracker use brute force. Everyone can use it. Best wishes!☆25Nov 16, 2017Updated 8 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 7 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- Tool to handle rpmnew and rpmsave files☆47Jul 8, 2025Updated 8 months ago