A Linux backdoor with the goal of circumventing network firewalls.
☆16Nov 30, 2011Updated 14 years ago
Alternatives and similar repositories for FireWalk
Users that are interested in FireWalk are comparing it to the libraries listed below
Sorting:
- Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.☆11Apr 1, 2017Updated 8 years ago
- Small Backdoor/rootkit for linux kernel☆21Jan 26, 2014Updated 12 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Sep 20, 2015Updated 10 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Sep 20, 2015Updated 10 years ago
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆15Sep 21, 2015Updated 10 years ago
- Python 3 update for https://code.google.com/archive/p/goofile/☆15Aug 19, 2019Updated 6 years ago
- CDPSnarf is a network sniffer exclusively written to extract information from CDP (Cisco Discovery Protocol) packets.☆42Oct 13, 2010Updated 15 years ago
- Linux 802.11 channel hopping utility.☆21Mar 4, 2018Updated 7 years ago
- Working Set Page Cache side-channel IPC PoC☆68Jan 9, 2019Updated 7 years ago
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆23Mar 20, 2023Updated 2 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- A collection of OSCE preparation resources.☆24Oct 30, 2019Updated 6 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆28Aug 4, 2017Updated 8 years ago
- Durandal's Backdoor☆149Jun 18, 2023Updated 2 years ago
- Hash cracker☆57Apr 7, 2018Updated 7 years ago
- A DNS database debugger☆36Sep 9, 2022Updated 3 years ago
- t50 : Multi-protocol packet injector tool☆25Sep 20, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/nipper-ng☆73Jun 28, 2022Updated 3 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Sample code for 3rd party developers working on Android On Snapdragon☆12Sep 4, 2024Updated last year
- Getting BlindElephant into a working state, and updating the plugin files☆80Sep 2, 2020Updated 5 years ago
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆37May 29, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/hexorbase☆75Sep 7, 2017Updated 8 years ago
- Web app which displays the daily and hourly sentiments for a stock (user to enter ticker as input). Stock sentiments are determined from…☆10Sep 26, 2022Updated 3 years ago
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated last year
- Scripts to automate RECON process☆11Aug 31, 2025Updated 6 months ago
- ☆13Jan 23, 2026Updated last month
- Wireshark QMI dissector for Qualcomm based modems☆14Oct 2, 2025Updated 5 months ago
- dotfiles☆11Feb 20, 2026Updated last week
- 古诗生成 GAN☆10Aug 28, 2020Updated 5 years ago
- ☆11Jul 26, 2024Updated last year
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆88Jun 21, 2021Updated 4 years ago
- LinkedinScraper is an another information gathering tool written in python. You can scrape employees of companies on Linkedin.com and the…☆37Jul 27, 2020Updated 5 years ago
- Highly recommended dorks for bug bounty☆19Oct 17, 2021Updated 4 years ago
- Challenge files☆11Sep 30, 2021Updated 4 years ago
- My attempts at making life with VMware that little bit easier.☆11Aug 7, 2023Updated 2 years ago
- CLI to check Google Maven repository for versions of AndroidX libraries☆12Updated this week
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago