mich01 / SpiderSMS
An End to End Encrypted SMS and SMS Tunneling app
☆41Updated last year
Related projects ⓘ
Alternatives and complementary repositories for SpiderSMS
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆23Updated 2 years ago
- POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)☆17Updated 3 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆20Updated 7 months ago
- Emulate the handshake packets of an RDP server with python☆15Updated 6 years ago
- Recon-ng modules for basic OSINT.☆10Updated 2 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Updated last year
- ☆14Updated 3 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆11Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆17Updated this week
- Impacket is a collection of Python classes for working with network protocols.☆10Updated last year
- Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker☆22Updated 3 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- A script for SOC operators' first analysis. Add new player in the game.☆8Updated 2 years ago
- Notes some analysis related to VidarStealer sample☆14Updated 6 months ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 3 years ago
- ☆17Updated last year
- Simple POC of Voice C2 using Speech Recognition☆13Updated 2 years ago
- Machine Learning basics with phishing dataset☆10Updated 3 years ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 7 months ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- 🌵 Command and Action routine Server☆14Updated this week