l0x-c0d3z / hashView external linksLinks
The Gruqg's old hacking harness, from times of old before github
☆14Mar 10, 2018Updated 7 years ago
Alternatives and similar repositories for hash
Users that are interested in hash are comparing it to the libraries listed below
Sorting:
- We store attacks and exploits that we've found useful in our research☆13Jun 4, 2015Updated 10 years ago
- GoLang Scripting Expert, a repo for template scripts regarding basic golang functions, many with a security focus☆23Jun 22, 2020Updated 5 years ago
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆14Feb 25, 2024Updated last year
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- advanced Perl Backdoor☆13Jun 6, 2015Updated 10 years ago
- Run remote system commands from Oracle connection - oracle exec command perl☆12Jun 6, 2015Updated 10 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- web based nmap scan collection and search☆19May 13, 2021Updated 4 years ago
- ☆17Sep 9, 2022Updated 3 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Nov 28, 2019Updated 6 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Apr 19, 2023Updated 2 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- Enhanced version of secdev's shellforge G3. More platforms and architectures supported.☆47Apr 22, 2023Updated 2 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆41Apr 28, 2018Updated 7 years ago
- List of Services (File Sharing, URL shorteners...)☆19Oct 4, 2020Updated 5 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Jun 6, 2016Updated 9 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 10 years ago
- The boilerplate for a new Journal site☆19Oct 15, 2019Updated 6 years ago
- Passive DNS collection (and statistics) from RIPE Atlas Sensors☆19Apr 23, 2017Updated 8 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆100Feb 9, 2017Updated 9 years ago
- Simple SSH brute-forcer written in Go☆23May 29, 2016Updated 9 years ago
- Mainframe Transfer: PROTOCOL☆28Mar 26, 2021Updated 4 years ago
- Various tools to track the Mirai botnet☆20Nov 3, 2016Updated 9 years ago
- ☆27Jul 21, 2020Updated 5 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Jun 26, 2018Updated 7 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆40Jul 17, 2013Updated 12 years ago
- WebFuzzer - Web Application Security Scanner by Cystack Team☆25Mar 14, 2017Updated 8 years ago
- MikroTik RouterOS Winbox未经身份验证的任意文件读/写漏洞☆30Dec 16, 2018Updated 7 years ago
- Mirai Botnet DB Project☆26Mar 20, 2019Updated 6 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Mar 8, 2019Updated 6 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆71Jan 21, 2019Updated 7 years ago
- Dexter v2 - Point of Sales Trojan☆26Feb 25, 2015Updated 10 years ago
- ELF packer for i386☆32Dec 14, 2015Updated 10 years ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Mar 23, 2018Updated 7 years ago
- Tools and documentation for TETRA decoding☆34Oct 8, 2024Updated last year
- IKE fuzzer☆29May 29, 2015Updated 10 years ago