jofpin / backcookieLinks
Small backdoor using cookie.
☆61Updated 8 years ago
Alternatives and similar repositories for backcookie
Users that are interested in backcookie are comparing it to the libraries listed below
Sorting:
- Simple Webshell Scanner☆50Updated 10 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆23Updated 7 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆76Updated 8 years ago
- Simple security surveillance script for linux distributions.☆59Updated 8 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 8 years ago
- A simple python reverse shell written just for fun.☆64Updated 2 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 6 years ago
- Red Login: SSH Brute-force Tools☆103Updated 6 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆50Updated 8 years ago
- Some wordpress user enumeration scripts.☆39Updated 8 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆56Updated 6 years ago
- pinky - The PHP mini RAT (Remote Administration Tool)☆77Updated 6 years ago
- ☆19Updated 7 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆46Updated 8 years ago
- ☆24Updated 9 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆18Updated 8 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆61Updated 10 years ago
- Tool to automatic leak information using Hacking with engine searches☆92Updated 7 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Updated 8 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆57Updated 5 years ago
- Web interface for recon-ng☆14Updated 9 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- Gathering Email Information Tool☆37Updated 8 years ago
- web information gathering / Grab links☆43Updated 5 years ago
- Post-Exploitation Framework☆77Updated 8 years ago