picoflamingo / hacking_codesLinks
Collection of Security Related Examples for Learning Purposes
☆13Updated 10 years ago
Alternatives and similar repositories for hacking_codes
Users that are interested in hacking_codes are comparing it to the libraries listed below
Sorting:
- Metasploit Usage Wiki☆48Updated 10 years ago
- A python script for obfuscating wireless networks☆79Updated 9 years ago
- CDDC Exploitation Framework☆13Updated 2 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Updated 10 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Updated 10 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- Demo of how to create binaries with a colliding MD5☆33Updated 8 years ago
- A security write-up about the Paypal API & data leakage☆25Updated 9 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- Automatic backdooring apk with meterpreter (PoC)☆52Updated 9 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Updated 7 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 10 years ago
- Post Exploitation Linux Toolkit☆33Updated 9 years ago
- ☆54Updated 8 years ago
- A shell / chat bot for XMPP and cloud services☆49Updated 10 years ago
- A shellcode testing harness.☆70Updated last year
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Updated 9 years ago
- Linux rootkit and detection examples☆32Updated 10 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 9 years ago
- Network Guardian☆12Updated 8 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Updated 10 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35Updated 10 years ago
- IRC-based mass router scanner/exploiter - The project is no longer maintained.☆89Updated 9 years ago
- Clone of hidden tear written in C++☆70Updated 5 years ago
- Proof of Concepts, Exploits☆28Updated 9 months ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 8 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Updated 10 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆63Updated 7 years ago