jingchunzhang / backdoor_rootkit
☆86Updated last year
Alternatives and similar repositories for backdoor_rootkit:
Users that are interested in backdoor_rootkit are comparing it to the libraries listed below
- ☆89Updated 4 years ago
- Java Untrusted Deserialization Exploits Tools☆66Updated 9 years ago
- ppsx file generator for cve-2017-8570 (based on bhdresh/cve-2017-8570)☆67Updated 6 years ago
- Usage: python badtunnel.py wpad_server_ip☆62Updated 8 years ago
- A Swiss Army Knife for Windows Exploit Development.☆41Updated 8 years ago
- *NIX X11 Keylogger☆75Updated 5 years ago
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 7 years ago
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆174Updated 7 years ago
- ☆7Updated 10 years ago
- A webshell connection tool with customized WAF bypass payloads☆125Updated 6 years ago
- ☆112Updated 7 years ago
- Some kernel exploit i wrote☆77Updated 10 years ago
- Flash XSS Scanner☆53Updated 8 years ago
- ☆46Updated 8 years ago
- CMSmap is a python open source CMS (Content Management System) scanner that automates the process of detecting security flaws of the most…☆80Updated 10 years ago
- Fuzzbunch Python-Wine wrapper☆57Updated 7 years ago
- A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.☆46Updated 9 years ago
- Search hashes in different website.☆33Updated 4 years ago
- ☆164Updated 6 years ago
- MS17-010 exploits, payloads, and scanners☆94Updated 7 years ago
- ☆15Updated 8 years ago
- MS17-010 multithreading scanner written in python.☆75Updated 7 years ago
- Some tools to monitor BillGates CnC servers☆135Updated 10 years ago
- ☆84Updated 8 years ago
- Struts2 S2-045(CVE-2017-5638)Vulnerability environment - http://www.mottoin.com/97954.html☆24Updated 8 years ago
- Shell script for testing the SSL/TLS Protocols☆33Updated 7 years ago
- St2-052☆55Updated 7 years ago
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago
- using python to hack☆31Updated 9 years ago
- Exploits used on hacking CTF's☆28Updated 5 years ago