nitr0us / knock-outView external linksLinks
A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based server and libnet-based client. No TCP/UDP port listening.
☆49May 3, 2017Updated 8 years ago
Alternatives and similar repositories for knock-out
Users that are interested in knock-out are comparing it to the libraries listed below
Sorting:
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 6 years ago
- (harmless) mirai botnet client☆14Dec 29, 2016Updated 9 years ago
- A reverse socks5 proxy server and client☆18Oct 19, 2017Updated 8 years ago
- Project for the Crypto subject at Uni☆18Dec 26, 2016Updated 9 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- This is a Firefox WebExtension that monitors the browsing activity and automatically perform an automated XSS vulnerability scan by submi…☆18Jan 21, 2017Updated 9 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Feb 5, 2016Updated 10 years ago
- Passive DNS collection (and statistics) from RIPE Atlas Sensors☆19Apr 23, 2017Updated 8 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- Honeypot built to mimic an insecure GoAhead Wifi Camera☆18Apr 4, 2017Updated 8 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- An On-The-Cloud free "greybox" box scanner for various purposes.☆14Nov 21, 2017Updated 8 years ago
- LibreSSL with a backdoor in RSA key generation☆17Jun 26, 2016Updated 9 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 8 years ago
- A Flask-like µFramework for Gopher☆20Jul 18, 2025Updated 6 months ago
- Modbus stager in assembly and some scripts to upload/download data to the holding register of a PLC☆44Jun 10, 2020Updated 5 years ago
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- Honeypot for router backdoor (TCP 32764)☆19Feb 6, 2014Updated 12 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆138Dec 22, 2017Updated 8 years ago
- A collection of tools for injecting DSOs in processes under various operating systems☆51Oct 6, 2022Updated 3 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆70Jul 26, 2018Updated 7 years ago
- IPSec testing tool☆19Oct 19, 2024Updated last year
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- PoC to append and extract data at the end of an ELF file☆20Aug 20, 2017Updated 8 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Jan 20, 2018Updated 8 years ago
- Minimalistic IKEv2 (RFC 5996) implementation in Python.☆22Mar 16, 2018Updated 7 years ago
- A tool to analyse JMX API security level.☆43Jul 23, 2014Updated 11 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Apr 13, 2015Updated 10 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆55Mar 27, 2017Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- BitTorrent Tracker with upload & browsing, written on the 25th Chaos Communication Congress☆33Dec 25, 2013Updated 12 years ago
- Warning: These are REAL, EVIL executables.. download at your own risk, submit your own.☆19Jul 13, 2020Updated 5 years ago
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆35Nov 15, 2024Updated last year