loveshell / awesome-list
☆9Updated 8 years ago
Alternatives and similar repositories for awesome-list:
Users that are interested in awesome-list are comparing it to the libraries listed below
- [Mirror] thc.org uses a CA that is not trusted on a base Arch system so we are mirroring some source here.☆14Updated 11 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆21Updated 9 years ago
- Windows DPAPI laboratory☆12Updated 7 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆22Updated 7 years ago
- -notes and scripts for online course OffIOT☆12Updated 7 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Updated 7 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆55Updated 5 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- See here:☆42Updated 12 years ago
- A collection of shellcodes☆67Updated 12 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- Aranea is a fast and clean dns spoofing tool.☆17Updated 13 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- DHCP attack tool☆19Updated 5 months ago
- Windows Offline Common Password Hash Checker☆29Updated 8 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 7 years ago
- Scapy Penetration testing scripts☆22Updated 9 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Projects and POCs☆60Updated 10 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- A Unix rootkit☆16Updated 4 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- ☆18Updated last year
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- Nirsoft Package to create an powerful usb sniffer in background☆13Updated 10 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆10Updated 10 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆41Updated 6 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Updated 5 years ago