meliht / SIP-DDLinks
SIP-Based DDoS Defense Tool
☆15Updated 6 years ago
Alternatives and similar repositories for SIP-DD
Users that are interested in SIP-DD are comparing it to the libraries listed below
Sorting:
- A fully featured Windows backdoor that uses email as a C&C server☆17Updated 7 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- An tool for search IOT MQTT vulnerable with shodan☆20Updated 7 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Updated 4 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 5 years ago
- Collection of Nmap scripts☆10Updated 9 years ago
- Telegram notification for metasploit sessions.☆14Updated 6 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Updated 5 years ago
- SWF Vulnerability & Information Scanner☆19Updated 6 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 8 years ago
- IDS/IPS malware download evasion☆15Updated 6 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- VNC pentest tool with bruteforce and ducky script execution features☆23Updated 7 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 8 months ago
- My Shellcode Archive☆28Updated 8 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆19Updated 5 years ago
- phpldapadmin remote exploit and vulnerable container !☆13Updated 6 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 6 years ago
- Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate☆20Updated 6 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- ☆17Updated 6 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Updated 6 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Updated 6 years ago
- My metasploit modules☆11Updated 10 years ago
- A modular pentesting framework implemented in C☆14Updated 7 years ago