☆32May 10, 2016Updated 9 years ago
Alternatives and similar repositories for gootkit-xswkit-js
Users that are interested in gootkit-xswkit-js are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- A set of tools based on radare2 for analysis of ROP gadgets and payloads.☆15Apr 20, 2016Updated 9 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Oct 4, 2016Updated 9 years ago
- MALM: Malware Monitor☆49Jun 14, 2013Updated 12 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- DNS traffic indexer and analyzer☆26Oct 7, 2014Updated 11 years ago
- Script which is able to decrypt data sent to AzoRult 3.3 Server☆11Feb 5, 2021Updated 5 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- KeePass Two-Channel Auto-Type Obfuscation Keylogger☆10Feb 3, 2016Updated 10 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- Anti-AV compilation☆44Oct 4, 2013Updated 12 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- Random Code Store☆17Mar 27, 2023Updated 3 years ago
- ☆23Sep 21, 2014Updated 11 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Apr 3, 2016Updated 10 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- NTP Scanner and 'monlist' checker☆13Sep 1, 2015Updated 10 years ago
- iOS Simulator, I got you.☆28Jul 31, 2017Updated 8 years ago
- ☆68Jun 21, 2017Updated 8 years ago
- Uncategorized utilities☆55Jan 5, 2019Updated 7 years ago
- Tinba Banking Trojan☆88Feb 25, 2015Updated 11 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Python Application to Reverse Freezing☆36Jul 21, 2016Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- Tools☆13Apr 20, 2023Updated 2 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- Changes MDM registry keys without the need for an MDM server to quickly disable WiFi-Sense and handle other potential security concerns i…☆15Aug 10, 2015Updated 10 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆331Apr 19, 2017Updated 9 years ago
- A fork from http://create.stephan-brumme.com/hash-library/.☆16Jan 29, 2026Updated 2 months ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Windows SMEP Bypass U=S☆38Apr 8, 2016Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆17Mar 22, 2018Updated 8 years ago
- dns logger for passive dns collection☆42May 27, 2012Updated 13 years ago
- A PowerShell script to parse the docx/docm file format and update the template location.☆17Oct 15, 2019Updated 6 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆34Apr 1, 2018Updated 8 years ago
- Open source exploit framework made in C#☆54Jan 27, 2025Updated last year
- Framework complet d'analyse de malware☆12Feb 22, 2016Updated 10 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 7 years ago