☆11Jun 4, 2019Updated 6 years ago
Alternatives and similar repositories for Cisco_ASA_Backdoor
Users that are interested in Cisco_ASA_Backdoor are comparing it to the libraries listed below
Sorting:
- Fork of ligolo-ng with exec and service capability☆17Oct 30, 2023Updated 2 years ago
- d3d12 wallhack, dx12 wallhack, d3d wallhack, wallhack, d3d12 overlay☆30Updated this week
- a dkom rootkit that targets windows x64 systems. the rootkit hooks and edits criticl memory sections in order to hide different resources…☆18Jul 5, 2023Updated 2 years ago
- CVE-2019-6467 (BIND nxdomain-redirect)☆26Apr 25, 2019Updated 6 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Apr 3, 2016Updated 9 years ago
- A Win32 way to use WinUI3☆33Apr 26, 2023Updated 2 years ago
- Linux Kernel module-less implant (backdoor)☆73Mar 11, 2021Updated 4 years ago
- Mimosa Framework to abuse EPC functionality on CISCO Routers.☆30Dec 12, 2024Updated last year
- Ingest Nessus files into Elasticsearch using PowerShell!☆17Nov 14, 2025Updated 3 months ago
- TLS Examples in Schannel and IO Completion Ports☆10Jun 21, 2022Updated 3 years ago
- dns tunnel C2☆84Jan 18, 2022Updated 4 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆44Sep 6, 2021Updated 4 years ago
- Windows日志清除工具☆10Apr 3, 2023Updated 2 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Jan 21, 2023Updated 3 years ago
- A reverse PTY shell in C☆101Sep 19, 2018Updated 7 years ago
- 7zip Static Build Dockerfile☆13Dec 23, 2024Updated last year
- BypassAV无net添加windows用户☆10Jan 7, 2021Updated 5 years ago
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Jul 2, 2018Updated 7 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- salt state definitions for installing logstash, elasticsearch and kibana☆36Aug 6, 2013Updated 12 years ago
- amd64 Linux docker container for cross-compilation to FreeBSD.☆12May 22, 2024Updated last year
- Windows NTLMSSP library☆10Aug 27, 2021Updated 4 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- ☆11Sep 30, 2023Updated 2 years ago
- Process doppelganging POC using direct system calls, PPID spoofing and dropbox as an external delivery channel for the payload.☆16Jan 7, 2021Updated 5 years ago
- Given a kind of unknown encoding and the result of encoding, using this framework, we can crack and get the original text☆20Jan 24, 2018Updated 8 years ago
- tcp socket封包,解包,粘包处理(包头+包体)☆10Sep 6, 2016Updated 9 years ago
- ☆11Apr 23, 2019Updated 6 years ago
- Convert GnuPG private keys to Tor hidden service keys (and vice versa)☆12Jun 11, 2015Updated 10 years ago
- Example of an over all attack using DLL_Wrapper.☆11Aug 22, 2017Updated 8 years ago
- TP-Link TL-WR1043ND - Authenticated Remote Code Execution☆16Jul 29, 2025Updated 7 months ago
- ☆11Nov 28, 2016Updated 9 years ago
- encrypted-linux-kernel-modules☆12Nov 4, 2020Updated 5 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- Basic SOCKS 5 client library in Tcl.☆13Aug 6, 2022Updated 3 years ago
- Some Of Huawei Routers Exploits☆13Sep 1, 2016Updated 9 years ago
- Exploit script for CVE-2020-7961☆18Jan 15, 2021Updated 5 years ago