mhils / tr069Links
☆29Updated 2 years ago
Alternatives and similar repositories for tr069
Users that are interested in tr069 are comparing it to the libraries listed below
Sorting:
- Winbox protocol experimental implementation (for testing only)☆23Updated 5 years ago
- Сollection of TCL scripts for Cisco IOS penetration testing☆67Updated 7 years ago
- A ptrace POC by hooking SSH to reveal provided passwords☆186Updated 8 years ago
- Pre-compiled tools to tunnel TCP over RDP Connections☆87Updated 7 years ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆124Updated 10 months ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Updated last month
- PoC of injecting code into a running Linux process☆23Updated 6 years ago
- vex - an asynchronous reverse connection helper for SOCKS4/5 proxies.☆16Updated 5 years ago
- reverse socks tunneler with ntlm and proxy support☆57Updated 3 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆71Updated 5 years ago
- bdvl☆114Updated 3 years ago
- Fortigate password recovery☆18Updated 7 years ago
- ☆81Updated 11 years ago
- A tiny Tor client implementation (written in C).☆18Updated 7 years ago
- Mikrotik SMB buffer overflow exploit☆65Updated 7 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆74Updated 6 years ago
- MikroTik remote jailbreak for v6.x.x☆140Updated 2 years ago
- Mara is a userland pty/tty sniffer☆53Updated last year
- DES Rainbow Table Online Phase☆25Updated 8 years ago
- Stealthy data exfiltration via IPv6 covert channel☆102Updated 6 years ago
- adding a backdooruser using win32api☆80Updated 5 years ago
- Python script to parse Keytab files for macOS or *nix (typically /etc/krb5.keytab)☆37Updated 6 years ago
- -x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x- LD_PRELOAD based user-land rootkit for Linux platform.☆28Updated 4 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆69Updated 5 years ago
- CVE-2020-0618 Honeypot☆30Updated 5 years ago
- An evil bit backdoor for iptables☆54Updated 4 years ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆47Updated 3 years ago
- POC exploit code for CVE-2020-1048(PrintDemon)☆14Updated 5 years ago
- Resurrecting and updating the best log cleaner☆34Updated 10 years ago
- DDoor - cross platform backdoor using dns txt records☆30Updated 3 years ago