这是nps的魔改,进行了流量特征的魔改,并且进行了漏洞的修复
☆24May 23, 2023Updated 2 years ago
Alternatives and similar repositories for npsmodify
Users that are interested in npsmodify are comparing it to the libraries listed below
Sorting:
- 小浣熊漫画CMS5.0☆20May 26, 2020Updated 5 years ago
- RPC 调用添加ssp扩展dump lsass☆24Aug 16, 2022Updated 3 years ago
- Go Shellcode Loader to be Integrated in Exploration C2☆27Feb 7, 2025Updated last year
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆45Jul 9, 2025Updated 8 months ago
- 在5MB的内存和硬盘以内,实现FRPC的WebUI管理界面,抛弃臃肿的Java和MySQL☆12Feb 10, 2023Updated 3 years ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆90Feb 19, 2025Updated last year
- host碰撞工具☆13May 22, 2023Updated 2 years ago
- Exploit for CVE-2024-0402 in Gitlab☆15Mar 18, 2025Updated 11 months ago
- My CTF Challenge☆11Feb 5, 2026Updated last month
- Resolve Skype accounts by phone number with API interface☆13Jul 16, 2023Updated 2 years ago
- ☆14Jul 1, 2025Updated 8 months ago
- 用于若依和Jeecg数据库中密码的爆破☆23Jul 19, 2025Updated 7 months ago
- Challenge handouts, source code, and solutions for UofTCTF 2026☆37Jan 13, 2026Updated last month
- OSCP Prep notes☆14Oct 18, 2020Updated 5 years ago
- docker-microtsocks☆11Sep 7, 2023Updated 2 years ago
- Android webviews and securiy☆23Sep 18, 2025Updated 5 months ago
- 微信报警☆11Apr 14, 2017Updated 8 years ago
- ICPC codebook used by kiseki☆11Nov 11, 2024Updated last year
- Backport of SliverStager to work with DotNetToJScript for vba☆17Aug 9, 2024Updated last year
- HITCON 2025 x DEVCORE Wargame☆15Sep 8, 2025Updated 6 months ago
- VaniSSH is a simple tool for generating vanity SSH public keys that start, contain, or end with specified strings.☆19Sep 21, 2025Updated 5 months ago
- 107逢甲-安全程式設計-教材與CTF題目☆12Nov 2, 2019Updated 6 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆10Mar 17, 2020Updated 5 years ago
- NTU Computer Security 2019 fall☆10Mar 20, 2021Updated 4 years ago
- 全自动化xss扫描框架☆69Sep 16, 2025Updated 5 months ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- ☆11Apr 10, 2021Updated 4 years ago
- ☆12Aug 22, 2022Updated 3 years ago
- Easy to install v2board with docker☆12Dec 23, 2025Updated 2 months ago
- Really stupid re-implementation of invoke-wmiexec☆13Jul 14, 2022Updated 3 years ago
- frp流量特征修改版☆15Sep 19, 2024Updated last year
- Python implementation of Wagner's Algorithm for the Generalized Birthday Problem.☆19Aug 15, 2023Updated 2 years ago
- a better basefinder☆12Aug 25, 2021Updated 4 years ago
- 使用動態規劃 (Dynamic Programming) 計算肯德基最佳優惠方案☆11Oct 18, 2022Updated 3 years ago
- ☆14Nov 2, 2023Updated 2 years ago
- linux ebpf backdoor demo☆12Nov 20, 2024Updated last year
- ☆12Nov 20, 2022Updated 3 years ago
- 集成 heapdump + shiro + fastjson + log4j2 漏洞环境☆13Apr 29, 2025Updated 10 months ago