node-modules / dns-hijacking
☆9Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for dns-hijacking
- Docker kinsing malware bitcoin/xmr miner☆22Updated 3 years ago
- Running mirai botnet in lab environment☆10Updated 7 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆10Updated 4 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆41Updated 6 years ago
- Display Languages Volatile Environment LPE☆10Updated 2 years ago
- Windows Malware Probe of Concept☆21Updated 2 years ago
- Performance Monitor Volatile Environment LPE☆17Updated 2 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆16Updated 6 years ago
- Component Services Volatile Environment LPE☆11Updated 2 years ago
- Remote Assistance Volatile Environment LPE☆13Updated 2 years ago
- Project to practice the basic at exploit bufferoverflow bugs.☆10Updated 7 years ago
- Sysprep Volatile Environment LPE (2017)☆13Updated 2 years ago
- Enter Product Key Volatile Environment LPE☆11Updated 2 years ago
- Data retrieved via a quick & dirty web scraper. Currently contains the text data from each page that was dumped as of 2017-03-07. File na…☆22Updated 7 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆35Updated 11 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- C & Shellcode Playground..☆11Updated 6 years ago
- TaskMgr Volatile Environment LPE☆12Updated 2 years ago
- Exploit Pack - One step ahead☆11Updated 11 years ago
- Decrypt Wireless Passwords On Windows☆13Updated 4 years ago
- Zerokit server controller☆13Updated 5 years ago
- Simple Linux RootKit written in python☆10Updated 6 years ago
- (In Progress) aims to develop an environment capable to simulate Botnet P2P Zeus,☆9Updated 10 years ago
- create customized .onion addresses for your hidden service,make shallot and eschalot tools☆12Updated 2 years ago
- An example of PE hollowing injection technique☆22Updated 5 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆8Updated 3 years ago
- Make smart phone go through socks proxy, by serving pac☆27Updated 5 years ago
- ☆20Updated 10 years ago
- AutoIt script that attempts to fully automate the process of playing texas-holdem poker.☆12Updated 3 years ago