picoflamingo / hacking_codesLinks
Collection of Security Related Examples for Learning Purposes
☆13Updated 10 years ago
Alternatives and similar repositories for hacking_codes
Users that are interested in hacking_codes are comparing it to the libraries listed below
Sorting:
- IRC-based mass router scanner/exploiter - The project is no longer maintained.☆89Updated 9 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Updated 10 years ago
- Automatic backdooring apk with meterpreter (PoC)☆52Updated 9 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆63Updated 7 years ago
- Unix remote-shell backdoor develop with Bash, Netcat, OpenSSL (data encryption with AES-128bit)☆25Updated 8 years ago
- simple reverse tcp backdoor hack☆63Updated 5 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆71Updated 11 years ago
- Linux rootkit and detection examples☆32Updated 10 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆17Updated 2 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆59Updated 10 years ago
- Wi-Fi Backdoors☆42Updated 10 years ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆87Updated 10 years ago
- ☆54Updated 8 years ago
- A python script for obfuscating wireless networks☆79Updated 9 years ago
- Clone of hidden tear written in C++☆70Updated 5 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 8 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆38Updated 8 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 9 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆61Updated 10 years ago
- A modular distributed penetration testing tool.☆41Updated 9 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 10 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 9 years ago
- A Upnp exploitation tool.☆106Updated 6 years ago
- Linux backdoor implementation written in Python☆58Updated 10 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 7 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- Work in progress toolkit for KRACK attack.☆70Updated 6 years ago