jogonba2 / Syn-Flood
Syn flood implementation with raw sockets.
☆13Updated 10 years ago
Alternatives and similar repositories for Syn-Flood:
Users that are interested in Syn-Flood are comparing it to the libraries listed below
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆21Updated 9 years ago
- A collection of shellcodes☆68Updated 12 years ago
- runtime code injector for Linux☆27Updated 13 years ago
- A backdoor socket that takes commands from a client and executes them in the server machine☆9Updated 7 years ago
- ☆15Updated 8 years ago
- Solutions for various crackmes☆20Updated 12 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 8 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- For BurpSuite Plugins☆11Updated 9 years ago
- XSS Weaponization☆34Updated 11 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- python based backdoor software☆17Updated 13 years ago
- All tools you needed during penetration testing.☆17Updated 8 years ago
- HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.☆21Updated 7 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- j0llydmper is a windows service that allows you to dump furtively and automaticaly some contents of USB disks just plugged in your comput…☆40Updated 13 years ago
- Scanner for document roots/URLs.☆14Updated 13 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- BitBender is a byte manipulation tool☆12Updated 7 years ago
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆23Updated 9 years ago
- SNMP Backdoor Communication Channel☆16Updated 13 years ago
- Openssh backdoor found with a ssh honeypot☆27Updated 8 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 7 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆11Updated 9 years ago