leonjza / dnsfilexfer
File transfer via DNS
☆73Updated 7 years ago
Alternatives and similar repositories for dnsfilexfer:
Users that are interested in dnsfilexfer are comparing it to the libraries listed below
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- A shellcode testing harness.☆69Updated 9 months ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- ☆25Updated 7 years ago
- Rogue AP killer☆89Updated 7 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- SSH, FTP and Telnet honeypots based on Twisted☆86Updated 5 years ago
- Enterprise WPA Wireless Tool Suite☆84Updated 2 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- This tool is based on regex with effective standards for detecting phishing sites in real time using certstream and can also detect puny…☆81Updated 6 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆84Updated 4 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- unix wildcard attacks☆133Updated 6 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 8 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆61Updated 6 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆52Updated 7 years ago
- Because I can't find scripts to do this anywhere else...☆25Updated 8 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Updated 10 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- Leak File Analyzer☆62Updated 7 years ago
- Testing/collecting some container breakouts☆94Updated 5 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 10 years ago