mattabullock / placeholder
☆31Updated 10 years ago
Alternatives and similar repositories for placeholder:
Users that are interested in placeholder are comparing it to the libraries listed below
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆33Updated 5 years ago
- This repo is all about myself coded exploit codes :)☆56Updated 5 years ago
- Helped during my OSCP lab days.☆15Updated 8 years ago
- For educational purposes only, use at your own responsibility. metasploit_rc_scripts - contains either sample rc files for explatation o…☆19Updated 7 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 7 years ago
- A collection of Burp Suite extensions☆29Updated 8 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Updated last year
- Examine HTTP response headers for common security issues☆39Updated 2 years ago
- Shell-style script to search exploit-db.com exploits.☆60Updated 4 months ago
- A few simple scripts and templates I have used during various phishing engagements.☆60Updated 9 years ago
- simple reverse tcp backdoor hack☆63Updated 4 years ago
- Post-exploitation scripts for OS X persistence and privesc☆72Updated 7 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 6 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Exploits Oracle 9i XDB ftp password buffer overflow vulnerability☆11Updated 9 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆82Updated 6 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆18Updated 6 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆76Updated 6 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆17Updated 8 years ago