mrcbax / injektiloLinks
An example command dropper in rust.
☆13Updated 7 years ago
Alternatives and similar repositories for injektilo
Users that are interested in injektilo are comparing it to the libraries listed below
Sorting:
- Data exfiltration PoC scripts☆25Updated 10 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Updated 7 years ago
- A collection of scripts made duing my personal research☆29Updated 7 years ago
- One-off scripts☆52Updated 8 years ago
- Automatically parses and attacks BloodHound-generated graphs☆42Updated 7 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 11 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 15 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 8 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Enumerate RIDs using pure Python☆33Updated last year
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆45Updated 4 years ago
- Summary and archives of leaked Vietnam TLD DNS data☆46Updated 8 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆107Updated 11 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 5 years ago
- Lair Framework dockerized.☆38Updated 4 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 11 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆34Updated 6 years ago
- Web application that lets you test if your domain is vulnerable to email spoofing☆41Updated 6 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Rogue AP killer☆92Updated 7 years ago
- DNS Botnet Server and Client☆34Updated 3 months ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 3 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Updated 11 years ago
- Proxy scraper for proxychains☆44Updated 5 years ago
- Empire HTTP(S) C2 redirector setup script☆48Updated 7 years ago
- Search public IP owner through ARIN☆60Updated 6 months ago
- Recursively searches a directory for any file containing a specified string☆48Updated 10 years ago