jacopodl / dstarLinks
DHCP attack tool
☆21Updated last year
Alternatives and similar repositories for dstar
Users that are interested in dstar are comparing it to the libraries listed below
Sorting:
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆18Updated 12 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 8 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 11 years ago
- A simple reflective dll example☆19Updated 8 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Updated 9 years ago
- Post-explotation Hacks☆14Updated 7 years ago
- [Windows] Local Privilege Escalation - WebClient☆59Updated 8 years ago
- PoC code for crashing windows active directory☆35Updated 7 years ago
- simple rootkit for computer security class☆14Updated 13 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 7 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆42Updated 8 years ago
- My metasploit modules☆11Updated 10 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated 2 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆33Updated 7 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Updated 8 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆23Updated 7 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- PowerShell script to bypass UAC using DCCW☆19Updated 8 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Updated 9 years ago
- Scripts targeting specific families☆13Updated 8 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 7 years ago
- Random stuff☆16Updated 7 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Mimikatz HashClash☆12Updated 10 years ago
- Making shellcode UD - https://osandamalith.com☆25Updated 9 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 3 years ago
- All tools you needed during penetration testing.☆18Updated 8 years ago
- 0x88 exploit pack Decoded☆27Updated 11 years ago
- ☆24Updated 7 years ago