infodox / tsh-sctpLinks
TinySHell port to SCTP
☆126Updated 11 years ago
Alternatives and similar repositories for tsh-sctp
Users that are interested in tsh-sctp are comparing it to the libraries listed below
Sorting:
- Terminal Service (RDP) Security Editor☆47Updated 8 years ago
- ☆81Updated 5 years ago
- HitCon 2016 Windows 10 x64 edge 0day and exploit☆103Updated 9 years ago
- Network traffic sensor☆112Updated 3 years ago
- libpcap based ICMP encrypted backdoor for linux.☆133Updated 4 years ago
- Wrappers around smbclient and winexe with PTH support☆33Updated 9 years ago
- Timer and Stay Resident☆35Updated 7 years ago
- Multi-threaded SSH Password Auditor☆93Updated 11 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆91Updated 8 years ago
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆53Updated 10 years ago
- This is a linux rootkit using many of the techniques described on☆167Updated 5 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- ☆20Updated last year
- misc pentest tools.☆26Updated 10 years ago
- Tools developed to test the Redirect to SMB issue☆84Updated 10 years ago
- An anti-ARP-spoofing application software that use active and passive scanning methods to detect and remove any ARP-spoofer from the netw…☆172Updated 5 years ago
- Windows 7 UAC Bypass Vulnerability in the Windows Script Host☆106Updated 10 years ago
- ☆94Updated 7 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆41Updated 3 years ago
- Unix remote login tool, rootkit shell tool☆34Updated 10 years ago
- ☆74Updated 3 years ago
- Patch pyc files with your code. Fairly lame.☆68Updated 9 years ago
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆35Updated 9 months ago
- ImaegMagick Code Execution (CVE-2016-3714)☆69Updated 9 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆59Updated 10 years ago
- Small Backdoor/rootkit for linux kernel☆21Updated 11 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- A shell / chat bot for XMPP and cloud services☆48Updated 9 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Slides from previous conference talks☆41Updated 8 years ago