leonjza / dnsfilexferLinks
File transfer via DNS
☆73Updated 8 years ago
Alternatives and similar repositories for dnsfilexfer
Users that are interested in dnsfilexfer are comparing it to the libraries listed below
Sorting:
- Rogue AP killer☆89Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆35Updated 2 years ago
- Network based protocol fuzzer☆71Updated 3 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- An ARP Poisoning Defender script☆43Updated 6 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆60Updated 5 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆63Updated 2 years ago
- unix wildcard attacks☆133Updated 7 years ago
- Testing/collecting some container breakouts☆94Updated 5 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Removed according to regulations☆35Updated 7 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 8 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆74Updated 8 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 9 years ago
- A shellcode testing harness.☆69Updated 10 months ago
- ☆74Updated 2 years ago
- ☆57Updated 4 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- tundeep☆42Updated 5 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Updated 4 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Updated 6 years ago