mrexodia / haxxmap
Some simple go tools to perform a Man-in-the-middle (MITM) attack on your IMAP server in case you forgot your password.
☆64Updated 6 years ago
Alternatives and similar repositories for haxxmap:
Users that are interested in haxxmap are comparing it to the libraries listed below
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- Drupal Honeypot☆57Updated 5 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆38Updated 5 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Updated 7 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 6 years ago
- PLASMA PULSAR☆69Updated 7 years ago
- Finding code caves in ELF files with GoLang☆26Updated 7 years ago
- ☆20Updated 6 years ago
- A simple SOCKS5 server written in Go☆27Updated 8 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- Mass scanning the internet (http and https) using a raw tcpstack.☆59Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 5 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 7 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆99Updated 5 years ago
- An example rootkit that gives a userland process root permissions☆78Updated 5 years ago
- ld_preload userland rootkit☆34Updated 4 years ago
- ☆14Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆85Updated 5 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- UAC 0Day all day!☆58Updated 7 years ago
- ☆16Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆23Updated 6 years ago
- Simple SSH brute-forcer written in Go☆21Updated 8 years ago