A Linux backdoor with the goal of circumventing network firewalls.
☆16Nov 30, 2011Updated 14 years ago
Alternatives and similar repositories for FireWalk
Users that are interested in FireWalk are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.☆11Apr 1, 2017Updated 9 years ago
- Small Backdoor/rootkit for linux kernel☆22Jan 26, 2014Updated 12 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- A lightweight tunnel proxy, just a toy☆10Apr 6, 2015Updated 11 years ago
- a list of ip route for gfw-blocked websites☆11Jun 8, 2011Updated 14 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Twilio log viewer / dashboard replacement. Faster than the Twilio API☆11Updated this week
- A cross-platform game library in the public domain☆15Aug 12, 2019Updated 6 years ago
- Stolen WiFi Aggregate Tunneling Protocol Dæmon (RAID your internet connections!)☆18Jun 16, 2012Updated 13 years ago
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- Chinese firewall blocked url tester☆17Oct 10, 2013Updated 12 years ago
- A quick String < - > HEX tool for Windows with Drag & Drop and File saving☆11Dec 4, 2018Updated 7 years ago
- Ansible Playbooks mainly for SmartOS Joyent/LX Zones☆11Feb 1, 2019Updated 7 years ago
- Unix remote login tool, rootkit shell tool☆32Jun 11, 2015Updated 10 years ago
- Python 3 update for https://code.google.com/archive/p/goofile/☆15Aug 19, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Sep 20, 2015Updated 10 years ago
- A Lazy Programmer's Tips for Avoiding the SOC ~ BSides Belfast 2024☆16Sep 12, 2024Updated last year
- Durandal's Backdoor☆150Jun 18, 2023Updated 2 years ago
- A minimalistic LDAP server that is meant for test vulnerability to JNDI+LDAP injection attacks in Java, especially CVE-2021-44228.☆11Dec 13, 2021Updated 4 years ago
- 🔐 Wrap keys from HSM using CKM_RSA_AES_KEY_WRAP step by step☆13Dec 10, 2021Updated 4 years ago
- CDPSnarf is a network sniffer exclusively written to extract information from CDP (Cisco Discovery Protocol) packets.☆42Oct 13, 2010Updated 15 years ago
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆23Mar 20, 2023Updated 3 years ago
- PHP翻墙工具下载工具,VPN,下载工具,FQ,翻墙下载,php☆15Apr 29, 2015Updated 11 years ago
- Configurations for tinc on routers, for bypassing GFW in China. Can be used to replace OpenVPN solutions.☆17Oct 20, 2014Updated 11 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Brute force password selection for EAP-MD5 authentication exchanges☆28Aug 4, 2017Updated 8 years ago
- TCMPortMapper is an Obj-C/Cocoa NAT-Traversal framework that maps ports via UPNP and NAT-PMP.☆28Aug 12, 2017Updated 8 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- libpcap based ICMP encrypted backdoor for linux.☆131Mar 26, 2021Updated 5 years ago
- iPhone Backup Analyzer☆34Dec 7, 2012Updated 13 years ago
- A way to backdoor every process☆66Oct 5, 2017Updated 8 years ago
- ☆16Nov 10, 2015Updated 10 years ago
- ☆10Jan 4, 2015Updated 11 years ago
- Linux 802.11 channel hopping utility.☆21Mar 4, 2018Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- in https://funoverip.net/2011/03/cd00r-knocking-backdoor-improved/☆26Jul 16, 2015Updated 10 years ago
- Watches for trigger packets, runs commands or spawns a shell☆26May 29, 2019Updated 6 years ago
- An MITM based Social Engineering (Phishing)attack POC!☆10Mar 25, 2014Updated 12 years ago
- Obfuscated Invoke-Mimikatz script☆13May 29, 2018Updated 7 years ago
- Crawl (~600K) labeled Portable Exe files from Microsoft Cabs☆14Jul 31, 2021Updated 4 years ago
- Red Team Projects with chat.openai.com.☆17Apr 3, 2023Updated 3 years ago
- Simulate afl-fuzz☆16Aug 1, 2019Updated 6 years ago