infodox / tsh-sctpLinks
TinySHell port to SCTP
☆125Updated 12 years ago
Alternatives and similar repositories for tsh-sctp
Users that are interested in tsh-sctp are comparing it to the libraries listed below
Sorting:
- Terminal Service (RDP) Security Editor☆47Updated 8 years ago
- Network traffic sensor☆112Updated 3 years ago
- ☆82Updated 5 years ago
- HitCon 2016 Windows 10 x64 edge 0day and exploit☆101Updated 9 years ago
- Timer and Stay Resident☆35Updated 7 years ago
- libpcap based ICMP encrypted backdoor for linux.☆132Updated 4 years ago
- Multi-threaded SSH Password Auditor☆93Updated 11 years ago
- An anti-ARP-spoofing application software that use active and passive scanning methods to detect and remove any ARP-spoofer from the netw…☆171Updated 5 years ago
- This is a linux rootkit using many of the techniques described on☆166Updated 6 years ago
- ☆20Updated last year
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆54Updated 11 years ago
- ☆35Updated 9 years ago
- dhcpig : initiates an advanced DHCP exhaustion attack☆61Updated 10 years ago
- Projects and POCs☆61Updated 11 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 10 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆41Updated 4 years ago
- LNHG - Mass Web Fingerprinter☆63Updated 9 years ago
- Collaborative Distributed Scanning Application (Uses modified DNmap on backend)☆71Updated 9 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Updated 10 years ago
- MS15-076 Privilege Escalation☆101Updated 10 years ago
- Decrypt MITM SSL RDP and save to pcap☆53Updated 11 years ago
- Wrappers around smbclient and winexe with PTH support☆33Updated 9 years ago
- Spray SMB with hashes, Then psexec☆32Updated 6 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Updated 10 years ago
- ☆54Updated 8 years ago
- Patch pyc files with your code. Fairly lame.☆67Updated 10 years ago
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne …☆35Updated last year
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆364Updated 11 years ago
- Avoidz tool to bypass most A.V softwares☆139Updated 8 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆69Updated 9 years ago