proxior / lan-wifi-interception-standardView external linksLinks
๐ lan and wifi interception. Gnu/Linux Version
โ18Oct 18, 2020Updated 5 years ago
Alternatives and similar repositories for lan-wifi-interception-standard
Users that are interested in lan-wifi-interception-standard are comparing it to the libraries listed below
Sorting:
- Rogue access point tool.โ57Jun 22, 2022Updated 3 years ago
- Php program for ddos attack (ip,url)โ63Jun 22, 2022Updated 3 years ago
- This is a bug for microphone for gnu/linux OSโ13Mar 24, 2020Updated 5 years ago
- ็ฎๅ็็PEๅ ่ฝฝๅจโ12Aug 11, 2020Updated 5 years ago
- An x64 binary executing code that's not inside of it.โ17Feb 28, 2023Updated 2 years ago
- mip22 is a advanced phishing toolโ651Jul 31, 2024Updated last year
- Execute an arbitrary command within the context of another processโ21Jun 28, 2019Updated 6 years ago
- Dump mapped PE files from memory to the diskโ20Jun 28, 2019Updated 6 years ago
- MSBuild AL bypassโ18Mar 9, 2023Updated 2 years ago
- A bunch of scripts and code i wrote.โ149Nov 7, 2024Updated last year
- A free tool to wipe devices without losing the iOS version. Works on iPhone 6s to X. iPhone 5s and 6 should work fine, but these devices โฆโ21Oct 12, 2023Updated 2 years ago
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).โ22Apr 23, 2022Updated 3 years ago
- proxphish is a advanced phishing toolโ16Jan 6, 2021Updated 5 years ago
- Just another casual shellcode native loaderโ25Feb 3, 2022Updated 4 years ago
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=โฆโ10Jun 13, 2017Updated 8 years ago
- An example of PE hollowing injection techniqueโ25Jun 28, 2019Updated 6 years ago
- Cs-Sleep-Mask-Fiberโ18May 16, 2025Updated 8 months ago
- Encrypted Shellcode Loader Generatorโ22Jan 29, 2019Updated 7 years ago
- Tool to Disable User Lockโ25Nov 22, 2022Updated 3 years ago
- Sp00fer blog post -โ24Jul 19, 2022Updated 3 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.โ26May 12, 2023Updated 2 years ago
- โ10Sep 11, 2021Updated 4 years ago
- This is an advance Phishing tool with 40 updated and new Phishing pages like = Flipcart, Telegram, iPFinder, LibertPay, Reddit, Tiktok, Eโฆโ37Aug 24, 2023Updated 2 years ago
- manual mapping injectorโ29Sep 28, 2025Updated 4 months ago
- Remote PE reflective injection with a simple reflective loaderโ32Jun 28, 2019Updated 6 years ago
- โ29Oct 19, 2024Updated last year
- A C port of b33f's UrbanBishopโ38Oct 1, 2020Updated 5 years ago
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscationโ31Sep 24, 2022Updated 3 years ago
- Sms Bomber (Mr Bomber)โ11Aug 7, 2023Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10โ37Nov 5, 2022Updated 3 years ago
- Windowsไธ็็ฎๆ่ฟ็จDLLๆณจๅ ฅๅทฅๅ ท (A simple process DLL injection tool under the Windows)โ28Oct 20, 2021Updated 4 years ago
- How to access Marianas web?โ13Jan 18, 2021Updated 5 years ago
- HEVD Exploits for fun and learning.โ15Aug 30, 2025Updated 5 months ago
- BadUSB ile Penetrasyonโ13Jun 15, 2019Updated 6 years ago
- โ10Sep 3, 2021Updated 4 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Executionโ38Jul 15, 2021Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.โ38Feb 16, 2020Updated 5 years ago
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.โ41Apr 10, 2023Updated 2 years ago
- An End to End Encrypted SMS and SMS Tunneling appโ40Apr 27, 2023Updated 2 years ago