pete911 / zip-bomb
scripts to create zip bombs
☆12Updated 11 years ago
Related projects ⓘ
Alternatives and complementary repositories for zip-bomb
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Collection of Nmap scripts☆10Updated 8 years ago
- Optional plugins for MITMf☆15Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- Search bing with python☆11Updated 10 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 7 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆12Updated 10 years ago
- Linux and Windows Hardening Points☆12Updated 6 years ago
- Get detailed information about a Twitter user activity☆17Updated 6 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆36Updated 4 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆15Updated 7 years ago
- Automated install process for Phishing Frenzy☆23Updated 9 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- A collection of scripts made duing my personal research☆28Updated 6 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 3 years ago
- Honeypot for router backdoor (TCP 32764)☆16Updated 10 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆10Updated 7 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 7 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 10 years ago
- Software exploitation training material☆15Updated 7 years ago
- PHP Phishing Framework☆28Updated 10 years ago
- python code to connect to mail servers and pillage the data contained within☆9Updated 8 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 10 years ago