Small backdoor using cookie.
☆63Oct 18, 2016Updated 9 years ago
Alternatives and similar repositories for backcookie
Users that are interested in backcookie are comparing it to the libraries listed below
Sorting:
- Simple Webshell Scanner☆55Jan 11, 2015Updated 11 years ago
- Bypass XSS Reflected Cross-site scripting☆33Oct 15, 2015Updated 10 years ago
- Identify connection of sessions for social engineering attacks.☆58Nov 15, 2016Updated 9 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20May 18, 2016Updated 9 years ago
- ☆17Jul 8, 2021Updated 4 years ago
- Password cracking utility☆54Apr 6, 2021Updated 4 years ago
- XMLRPC server for password cracking☆33Jan 20, 2015Updated 11 years ago
- Packet Acumen☆19Aug 20, 2014Updated 11 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24May 1, 2014Updated 11 years ago
- Admin Panel Finder☆39Sep 22, 2025Updated 5 months ago
- ActionScript ByteCode Disassembler☆16Oct 20, 2015Updated 10 years ago
- XSS Cookie Stealer | PROOF OF CONCEPT☆31Sep 1, 2022Updated 3 years ago
- ☆10May 30, 2015Updated 10 years ago
- Crypt and decrypt the cisco enable 7 passwords☆13Jan 24, 2022Updated 4 years ago
- Multi theaded DNS bruteforcing☆13May 7, 2014Updated 11 years ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Feb 12, 2015Updated 11 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- Aranea is a fast and clean dns spoofing tool.☆17Sep 20, 2011Updated 14 years ago
- Multi-threaded SSH Password Auditor☆93Feb 4, 2014Updated 12 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Dec 2, 2024Updated last year
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- ☆92Apr 16, 2017Updated 8 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Apr 10, 2022Updated 3 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆31Nov 6, 2013Updated 12 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- Prometheus Firewall Analyzer☆48May 1, 2015Updated 10 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- Unified repository for different Metasploit Framework payloads☆16Apr 3, 2017Updated 8 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Sep 10, 2013Updated 12 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- NXcrypt - 'python backdoor' framework☆366Jun 26, 2017Updated 8 years ago
- Binary and Directory tree comparison tool using Fuzzy Hashing☆84Feb 4, 2015Updated 11 years ago
- A phone CNAM lookup utility using the OpenCNAM API☆12Aug 15, 2014Updated 11 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- A python script for obfuscating wireless networks☆79Nov 14, 2016Updated 9 years ago