infodox / tsh-sctp
TinySHell port to SCTP
☆123Updated 11 years ago
Alternatives and similar repositories for tsh-sctp:
Users that are interested in tsh-sctp are comparing it to the libraries listed below
- Terminal Service (RDP) Security Editor☆47Updated 7 years ago
- Network traffic sensor☆110Updated 2 years ago
- HitCon 2016 Windows 10 x64 edge 0day and exploit☆101Updated 8 years ago
- ☆80Updated 4 years ago
- Timer and Stay Resident☆34Updated 6 years ago
- Linux kASLR (Intel TSX/RTM) bypass static library☆73Updated 7 years ago
- Yet Another Web Spider☆71Updated 7 years ago
- A generator to weaponize Macro payloads that can evade EMET and utilises native VB migration.☆116Updated 6 years ago
- ☆69Updated 7 years ago
- An anti-ARP-spoofing application software that use active and passive scanning methods to detect and remove any ARP-spoofer from the netw…☆173Updated 4 years ago
- a more complex ransomware honeypot☆121Updated 8 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 9 years ago
- libpcap based ICMP encrypted backdoor for linux.☆130Updated 3 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- Something something, botnet, blah something☆17Updated 9 years ago
- ☆74Updated 2 years ago
- Tools developed to test the Redirect to SMB issue☆83Updated 9 years ago
- Wrappers around smbclient and winexe with PTH support☆33Updated 8 years ago
- ☆138Updated 7 years ago
- Fuzzbunch Python-Wine wrapper☆57Updated 7 years ago
- ☆127Updated 9 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆60Updated 9 years ago
- Exploit collection for NT privilege escalation☆66Updated 9 years ago
- ☆20Updated last year
- ☆18Updated 7 years ago
- ☆34Updated 8 years ago
- Multi-threaded SSH Password Auditor☆93Updated 11 years ago
- Scripts that aren't PowerShell☆48Updated 5 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆70Updated 8 years ago
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆52Updated 10 years ago