mubix / FakeNetBIOS
See here:
☆42Updated 12 years ago
Alternatives and similar repositories for FakeNetBIOS:
Users that are interested in FakeNetBIOS are comparing it to the libraries listed below
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Updated 9 years ago
- Tools to work with vulnerability standards.☆19Updated 11 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- packetstormsecurity.net exploit archive 133ch3r☆23Updated 14 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆10Updated 9 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- Next Generation of White Chapel☆21Updated 10 years ago
- SQL Injection without the pain of syringes.☆25Updated 7 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- ☆12Updated 8 months ago
- Shovels a shell back to you on a specified port☆9Updated 4 years ago
- Network Forensics Workshop Files☆17Updated 9 years ago