mrexodia / haxxmapLinks
Some simple go tools to perform a Man-in-the-middle (MITM) attack on your IMAP server in case you forgot your password.
☆65Updated 6 years ago
Alternatives and similar repositories for haxxmap
Users that are interested in haxxmap are comparing it to the libraries listed below
Sorting:
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆38Updated 6 years ago
- ld_preload userland rootkit☆34Updated 4 years ago
- Modular rootkit framework.☆29Updated 4 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Drupal Honeypot☆57Updated 5 years ago
- Mass scanning the internet (http and https) using a raw tcpstack.☆59Updated 8 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 6 years ago
- Experiments with git blobs☆9Updated 7 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆48Updated 8 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 8 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Updated 7 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- Go-deliver is a payload delivery tool coded in Go.☆115Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- Probably the first binary (PE/ELF) infector ever created in GoLang.☆50Updated 3 years ago
- A reverse socks5 proxy server and client☆18Updated 7 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26Updated 7 years ago
- A way to backdoor every process☆66Updated 7 years ago
- ☆20Updated 7 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- This is a tool for exploiting Ticketbleed (CVE-2016-9244) vulnerability.☆28Updated 8 years ago
- ARCH : ARM, ARM64, MIPS, PPC, X86☆85Updated 6 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- Tool for injecting a "TCP Relay" managed assembly into unmanaged processes☆117Updated 6 years ago