mosajjal / ircbackdoorLinks
A Proof of Concept (PoC) IRC backdoor written in Python
☆11Updated 4 years ago
Alternatives and similar repositories for ircbackdoor
Users that are interested in ircbackdoor are comparing it to the libraries listed below
Sorting:
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- 0x88 exploit pack Decoded☆27Updated 11 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 8 years ago
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆23Updated 2 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Arp spoof detection tool☆25Updated 8 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Collection of Nmap scripts☆10Updated 9 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Updated 12 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆30Updated 4 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 10 months ago
- Port scanning and domain utility.☆30Updated 8 years ago
- Send files through the ICMP protocol☆43Updated 11 years ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Updated 9 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 9 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Updated 5 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 7 months ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆17Updated 8 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 7 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆37Updated 12 years ago
- "HeaderScan" Burp Plugin☆16Updated 11 years ago
- This version touches disk for registry persistence.☆26Updated 10 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 11 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated 2 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆45Updated 6 years ago