messede-degod / SF-UI
A GUI Frontend for services provided by segfault
☆76Updated 10 months ago
Alternatives and similar repositories for SF-UI:
Users that are interested in SF-UI are comparing it to the libraries listed below
- Telegram video (mp4) extension manipulation PoC☆79Updated 3 weeks ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆66Updated 8 months ago
- Proof of concept denial of service over TOR stress test tool☆40Updated 6 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆24Updated 3 months ago
- Proof of concept for DoS exploit☆53Updated last year
- Kali Packerge Manager☆59Updated last year
- a curated list of shodan dorks for finding sensitive data in shodan.io☆27Updated 8 months ago
- ☆95Updated last year
- PrivacyNet: Privacy Network☆47Updated 6 months ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆51Updated last year
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface and VirusTotal integ…☆65Updated 2 weeks ago
- Keygen for Positive Technologies Network Attack Detector☆23Updated last year
- A CDN Domain Fronting Tool or Websocket Discovery written in Python☆54Updated 2 years ago
- Google Dorking tool☆17Updated 4 months ago
- D-Link NAS CVE-2024-3273 Exploit Tool☆94Updated 11 months ago
- 🌮 INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)☆29Updated last year
- 🙊 Advanced Rat controllable by a telegram bot with many commands and functions.☆14Updated 9 months ago
- A Bash script to obfuscate Bash script☆38Updated 4 years ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆103Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆33Updated last month
- Perform With Massive Wordpress Enumeration☆11Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆41Updated last year
- Multiplatform Telegram Bot in pure PowerShell☆51Updated 2 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆33Updated 2 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆66Updated 5 years ago
- Scripts to set up your own Android 📱 app hacking lab☆79Updated 8 months ago
- PoC for CVE-2024-48990☆98Updated 4 months ago
- HydrAttack PoC eMail Spoofer Module is designed to test the security posture of a domain against email spoofing attacks. It performs step…☆20Updated last week
- CVE-2024-52940 - A zero-day vulnerability in AnyDesk's "Allow Direct Connections" feature, discovered and registered by Ebrahim Shafiei (…☆35Updated 4 months ago
- execute PE in memory Filelessly☆32Updated last month