meliht / SIP-DDLinks
SIP-Based DDoS Defense Tool
☆15Updated 6 years ago
Alternatives and similar repositories for SIP-DD
Users that are interested in SIP-DD are comparing it to the libraries listed below
Sorting:
- Miscellaneous exploit scripts☆17Updated 3 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆17Updated 7 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Updated 4 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 8 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- python tools to assist in penetration testing☆14Updated last week
- Collection of Nmap scripts☆10Updated 9 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- VNC pentest tool with bruteforce and ducky script execution features☆23Updated 7 years ago
- SWF Vulnerability & Information Scanner☆19Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- An tool for search IOT MQTT vulnerable with shodan☆20Updated 7 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 5 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆22Updated 7 years ago
- IDS/IPS malware download evasion☆15Updated 6 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 7 months ago
- Working exploit code for CVE-2019-17625☆18Updated 5 years ago
- Unofficial WhatCMS API package☆42Updated 4 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆25Updated 5 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated 2 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- yet another dirbuster☆19Updated 4 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 11 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 6 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 6 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Updated 8 years ago
- ☆26Updated 5 years ago