martinoj2009 / ICMPExfilView external linksLinks
Exfiltrate data with ICMP
☆102Jan 31, 2018Updated 8 years ago
Alternatives and similar repositories for ICMPExfil
Users that are interested in ICMPExfil are comparing it to the libraries listed below
Sorting:
- A tool to assess data quality, built on top of the awesome OSSEM.☆80Jul 29, 2022Updated 3 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- Scan for open S3 buckets and dump☆38Feb 23, 2018Updated 7 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- ☆25May 9, 2021Updated 4 years ago
- Automated 802.1x Bypass☆87Mar 11, 2020Updated 5 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Apr 8, 2023Updated 2 years ago
- A Report Generation Tool for Security Assessment☆65Dec 31, 2018Updated 7 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- Small CTF challenges running on Docker☆158Jul 26, 2018Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆29May 22, 2023Updated 2 years ago
- Git all your favorite tools in one click☆270Mar 10, 2022Updated 3 years ago
- ☆22Aug 31, 2016Updated 9 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Nov 19, 2017Updated 8 years ago
- Slides and reference material from Evading Autoruns presentation at DerbyCon 7 (September 2017)☆106Feb 10, 2021Updated 5 years ago
- ☆63Mar 21, 2018Updated 7 years ago
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago
- Lama, the application that does not mache these words.☆23Jun 9, 2019Updated 6 years ago
- A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.☆173Feb 19, 2025Updated 11 months ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆54Jun 15, 2018Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Listing subdomains about a main domain☆58May 9, 2018Updated 7 years ago
- PowerDNS: Powershell DNS Delivery☆215Sep 26, 2018Updated 7 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- modzero DNS Masquerading Server for Windows☆46May 23, 2018Updated 7 years ago
- Search for information related to domain: Emails - IP addresses - Sub-Domains - Information on WEB technology - Type of Firewall - NS and…☆116May 19, 2020Updated 5 years ago
- Simple script to automate brutforcing blind sql injection vulnerabilities☆50Jul 16, 2017Updated 8 years ago
- Brute forcer and shell deployer for WildFly☆101Mar 10, 2018Updated 7 years ago
- ☆14Aug 27, 2025Updated 5 months ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- Script to generate malicious debian packages (debain trojans).☆120Apr 24, 2019Updated 6 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆147May 10, 2016Updated 9 years ago
- ☆41May 16, 2018Updated 7 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Jun 30, 2018Updated 7 years ago
- A payload stager using PowerShell☆183Dec 15, 2019Updated 6 years ago