mosajjal / ircbackdoor
A Proof of Concept (PoC) IRC backdoor written in Python
☆10Updated 4 years ago
Alternatives and similar repositories for ircbackdoor:
Users that are interested in ircbackdoor are comparing it to the libraries listed below
- Web Application Firewall For Limited Exploitation☆17Updated 7 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 8 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- Popping boxes with Nmap☆17Updated 12 years ago
- SNMP Backdoor Communication Channel☆15Updated 13 years ago
- A simple python script to dump data from memcached servers.☆11Updated 10 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- Simple SSH vulnerability scanner based on SSH Harvester☆13Updated 7 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆10Updated 10 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Updated 8 years ago
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆10Updated 7 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆17Updated 7 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆12Updated 12 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Layer 2 VPN using a tap device on one end and pcap on the other☆10Updated 6 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Updated 10 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 10 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- This is the ToRat server, a part of the ToRat Project.☆23Updated 5 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 6 years ago
- Web Command Injection Tool☆10Updated 7 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- SQL Injection without the pain of syringes.☆25Updated 7 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- simple rootkit for computer security class☆14Updated 12 years ago