nccgroup / holepuncher
Holepuncher, A wrapper script to open ports in iptables and start a listener.
☆32Updated 9 years ago
Alternatives and similar repositories for holepuncher:
Users that are interested in holepuncher are comparing it to the libraries listed below
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- everything that does not fit elsewhere☆12Updated 7 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- ☆17Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- WeakNet PHP Execution Shell☆31Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Updated 14 years ago
- ☆27Updated 7 years ago
- Security scripts and programs I've made☆8Updated 10 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- ☆24Updated 10 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- ☆42Updated 10 years ago
- Exfiltrate files over dns requests using Python and/or Bash☆46Updated 9 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- ☆53Updated 8 years ago
- Windows Offline Common Password Hash Checker☆29Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 10 years ago
- Simple web app for displaying cowrie data in your browser☆12Updated 8 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26Updated 8 years ago