nccgroup / BinProxy
BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.
☆175Updated last year
Related projects ⓘ
Alternatives and complementary repositories for BinProxy
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 6 years ago
- ☆138Updated 7 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆141Updated 7 years ago
- a linux process hacker tool☆83Updated 5 years ago
- libpcap based ICMP encrypted backdoor for linux.☆128Updated 3 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆146Updated 6 years ago
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆173Updated 7 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆297Updated last year
- Universal Plug and Fuzz☆41Updated 5 years ago
- Public repository for improvements to the EXTRABACON exploit☆158Updated 8 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆213Updated 7 years ago
- Automated Exploit generation with WinDBG☆188Updated 8 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆114Updated 8 years ago
- Offline debugger for malware's reverse engineering☆113Updated 9 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆312Updated 6 years ago
- some pocs for antivirus evasion☆129Updated last year
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆158Updated 8 years ago
- The first open source vulnerability scanner for firmwares☆193Updated 8 years ago
- Collection of metasploit modules☆66Updated 7 years ago
- ☆74Updated 2 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆205Updated 6 years ago
- PyAna - Analyzing the Windows shellcode☆247Updated 8 years ago
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆206Updated 8 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆70Updated 8 years ago