infodox / tsh-sctpLinks
TinySHell port to SCTP
☆125Updated 12 years ago
Alternatives and similar repositories for tsh-sctp
Users that are interested in tsh-sctp are comparing it to the libraries listed below
Sorting:
- Terminal Service (RDP) Security Editor☆47Updated 8 years ago
- Network traffic sensor☆112Updated 3 years ago
- HitCon 2016 Windows 10 x64 edge 0day and exploit☆100Updated 9 years ago
- ☆82Updated 5 years ago
- Timer and Stay Resident☆35Updated 7 years ago
- ☆20Updated last year
- An anti-ARP-spoofing application software that use active and passive scanning methods to detect and remove any ARP-spoofer from the netw…☆172Updated 5 years ago
- libpcap based ICMP encrypted backdoor for linux.☆132Updated 4 years ago
- Multi-threaded SSH Password Auditor☆93Updated 11 years ago
- Patch pyc files with your code. Fairly lame.☆67Updated 10 years ago
- misc pentest tools.☆26Updated 10 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆41Updated 4 years ago
- Spray SMB with hashes, Then psexec☆32Updated 6 years ago
- dhcpig : initiates an advanced DHCP exhaustion attack☆61Updated 10 years ago
- LNHG - Mass Web Fingerprinter☆63Updated 9 years ago
- Wrappers around smbclient and winexe with PTH support☆33Updated 9 years ago
- ☆35Updated 9 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Updated 10 years ago
- MS15-076 Privilege Escalation☆101Updated 10 years ago
- MS17-010 multithreading scanner written in python.☆75Updated 8 years ago
- Yet Another Web Spider☆71Updated 8 years ago
- Projects and POCs☆61Updated 11 years ago
- PowerShell module for the exploitation and testing☆16Updated 10 years ago
- A BurpSuite extension for lair☆28Updated 8 years ago
- Fuzzbunch Python-Wine wrapper☆56Updated 8 years ago
- ☆74Updated 3 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆176Updated 8 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆59Updated 10 years ago
- Java Untrusted Deserialization Exploits Tools☆67Updated 9 years ago