mh4x0f / mh4x0f-blog
all scripts created/mentioned in blog mh4x0f
☆7Updated 7 years ago
Alternatives and similar repositories for mh4x0f-blog:
Users that are interested in mh4x0f-blog are comparing it to the libraries listed below
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Updated 9 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 8 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 7 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆79Updated 7 years ago
- ☆53Updated 7 years ago
- misc pentest tools.☆26Updated 10 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 6 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 8 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 8 years ago
- Thanos is a tool made for scan a range of IP's and get the banners of the running services. The main function is do banner grabber, but y…☆44Updated 8 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Updated 10 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Miscellaneous projects related to attacking Windows.☆28Updated 5 years ago
- This version touches disk for registry persistence.☆26Updated 9 years ago
- ☆31Updated 8 years ago
- Security scripts and programs I've made☆8Updated 10 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- Data exfiltration PoC scripts☆24Updated 9 years ago